Robust Hardware Trojan Detection Method by Unsupervised Learning of Electromagnetic Signals

Daehyeon Lee, Junghee Lee, Younggiu Jung, Janghyuk Kauh, Taigon Song

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

This article explores the threat posed by Hardware Trojans (HTs), malicious circuits clandestinely embedded in hardware akin to software backdoors. Activation by attackers renders these Trojans capable of inducing malfunctions or leaking confidential information by manipulating the hardware’s normal operation. Despite robust software security, detecting and ensuring normal hardware operation becomes challenging in the presence of malicious circuits. This issue is particularly acute in weapon systems, where HTs can present a significant threat, potentially leading to immediate disablement in adversary countries. Given the severe risks associated with HTs, detection becomes imperative. The study focuses on demonstrating the efficacy of deep learning-based HT detection by comparing and analyzing methods using deep learning with existing approaches. This article proposes utilizing the deep support vector data description (Deep SVDD) model for HT detection. The proposed method outperforms existing methods when detecting untrained HTs. It achieves 92.87% of accuracy on average, which is higher than that of an existing method, 50.00%. This finding contributes valuable insights to the field of hardware security and lays the foundation for practical applications of Deep SVDD in real-world scenarios.

Original languageEnglish
Pages (from-to)2327-2340
Number of pages14
JournalIEEE Transactions on Very Large Scale Integration (VLSI) Systems
Volume32
Issue number12
DOIs
Publication statusPublished - 2024

Bibliographical note

Publisher Copyright:
© 1993-2012 IEEE.

Keywords

  • Electromagnetic (EM) signals
  • hardware Trojan (HT)
  • machine learning (ML)
  • neural network algorithm
  • side channel
  • Trojan detection

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Robust Hardware Trojan Detection Method by Unsupervised Learning of Electromagnetic Signals'. Together they form a unique fingerprint.

Cite this