Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/33099
Title: Secure Run-Time Hardware Trojan Detection Using Lightweight Analytical Models
Authors: Amornpaisannon, Burin 
Diavastos, Andreas 
Peh, Li Shiuan 
Carlson, Trevor E. 
Major Field of Science: Engineering and Technology
Keywords: Training;Microarchitecture;Trojan horses;Hardware;Analytical models;Predictive models;Integrated circuit modeling
Issue Date: 1-Feb-2024
Source: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2024, vol. 43, iss. 2, pp. 431 - 441
Volume: 43
Issue: 2
Start page: 431
End page: 441
Journal: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 
Abstract: Hardware Trojans, malicious components that attempt to prevent a chip from operating as expected, are carefully crafted to circumvent detection during the predeployment silicon design and verification stages. They are an emerging threat being investigated by academia, the military, and industry. Therefore, run-Time hardware Trojan detection is critically needed as the final layer of defense during chip deployment, and in this work, we focus on hardware Trojans that target the processor's performance. Current state-of-The-Art detectors watch hardware counters for anomalies using complex machine-learning models, which require a dedicated off-chip processor and must be trained extensively for each target processor. In this work, we propose a lightweight solution that uses data from a single reference run to accurately determine whether a Trojan is slowing processor performance, across CPU configurations, without the need for new profiles. To accomplish this, we use an analytical model based on the application's inherent microarchitecturally independent characteristics. Such models determine the expected microarchitectural events across different processor configurations without requiring reference values for each application-hardware configuration pair. By comparing predicted values to actual hardware events, one can quickly check for unexpected application slowdowns that are the key signatures of many hardware Trojans. The proposed methodology achieves a higher true positive rate (TPR) compared to prior works while having no false positives. The proposed detector incurs no run-Time performance penalty and only adds a negligible power overhead of 0.005%.
URI: https://hdl.handle.net/20.500.14279/33099
ISSN: 02780070
DOI: 10.1109/TCAD.2023.3316113
Type: Article
Affiliation : National University of Singapore 
Publication Type: Peer Reviewed
Appears in Collections:Άρθρα/Articles

CORE Recommender
Show full item record

Page view(s)

18
Last Week
0
Last month
checked on Nov 21, 2024

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.