Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο:
https://hdl.handle.net/20.500.14279/33099
Τίτλος: | Secure Run-Time Hardware Trojan Detection Using Lightweight Analytical Models | Συγγραφείς: | Amornpaisannon, Burin Diavastos, Andreas Peh, Li Shiuan Carlson, Trevor E. |
Major Field of Science: | Engineering and Technology | Λέξεις-κλειδιά: | Training;Microarchitecture;Trojan horses;Hardware;Analytical models;Predictive models;Integrated circuit modeling | Ημερομηνία Έκδοσης: | 1-Φεβ-2024 | Πηγή: | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2024, vol. 43, iss. 2, pp. 431 - 441 | Volume: | 43 | Issue: | 2 | Start page: | 431 | End page: | 441 | Περιοδικό: | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | Περίληψη: | Hardware Trojans, malicious components that attempt to prevent a chip from operating as expected, are carefully crafted to circumvent detection during the predeployment silicon design and verification stages. They are an emerging threat being investigated by academia, the military, and industry. Therefore, run-Time hardware Trojan detection is critically needed as the final layer of defense during chip deployment, and in this work, we focus on hardware Trojans that target the processor's performance. Current state-of-The-Art detectors watch hardware counters for anomalies using complex machine-learning models, which require a dedicated off-chip processor and must be trained extensively for each target processor. In this work, we propose a lightweight solution that uses data from a single reference run to accurately determine whether a Trojan is slowing processor performance, across CPU configurations, without the need for new profiles. To accomplish this, we use an analytical model based on the application's inherent microarchitecturally independent characteristics. Such models determine the expected microarchitectural events across different processor configurations without requiring reference values for each application-hardware configuration pair. By comparing predicted values to actual hardware events, one can quickly check for unexpected application slowdowns that are the key signatures of many hardware Trojans. The proposed methodology achieves a higher true positive rate (TPR) compared to prior works while having no false positives. The proposed detector incurs no run-Time performance penalty and only adds a negligible power overhead of 0.005%. | URI: | https://hdl.handle.net/20.500.14279/33099 | ISSN: | 02780070 | DOI: | 10.1109/TCAD.2023.3316113 | Type: | Article | Affiliation: | National University of Singapore | Publication Type: | Peer Reviewed |
Εμφανίζεται στις συλλογές: | Άρθρα/Articles |
CORE Recommender
Όλα τα τεκμήρια του δικτυακού τόπου προστατεύονται από πνευματικά δικαιώματα