Hardware Trojan horse detection system and information data processing method based on unsupervised learning

A technology of hardware Trojan detection and unsupervised learning, applied in the direction of internal/peripheral computer component protection, etc., can solve the problems of reducing feature dimension, hardware Trojan horse does not contain state information, and it is difficult to completely distinguish Trojan horse networks, etc., to reduce feature dimension number effect

Active Publication Date: 2021-10-26
XIDIAN UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) The hardware Trojan horse does not contain any state information, the malicious attacker completely controls the hardware Trojan trigger, and implants various types of hardware Trojan horses, which is difficult to detect by traditional verification techniques
[0007] (2) The SoC in circulation is a complex heterogeneous system composed of multiple third-party IP cores. Due to the small size and concealment of hardware Trojans, it is difficult for the Trojan detection technology in third-party IP cores to completely distinguish Trojan networks. Malicious third-party suppliers even collude to manufacture hardware Trojans to evade detection
[0008] (3) Existing methods based on machine learning theory are all supervised learning methods that require a large amount of known information; the training process of supervised learning methods is time-consuming and usually requires a large amount of balanced training data
[0017] (3) A feature dimension reduction method is provided, which effectively reduces the feature dimension and retains more than 99% of the data information, and solves the problems of high algorithm complexity, long detection time, and detection problems caused by the high circuit feature dimension of the previous machine learning methods. Poor accuracy and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection system and information data processing method based on unsupervised learning
  • Hardware Trojan horse detection system and information data processing method based on unsupervised learning
  • Hardware Trojan horse detection system and information data processing method based on unsupervised learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0124] The hardware Trojan horse detection method based on machine learning provided by the embodiment of the present invention includes: analyzing the circuit structure and Trojan horse operation logic, combining the circuit characteristics of traditional machine learning, proposing the required circuit characteristics, and performing a gate-level netlist analysis of the circuit to be tested. Processing, extracting the features required for hardware Trojan detection, combining random forest, correlation matrix and parallel coordinates diagram to analyze the contribution of circuit features to distinguish normal circuits and Trojan circuits, select the best feature set, and after normalization processing, use The PCA (Principal Component Analysis) method reduces the dimensionality of the data, uses the reduced dimensionality data to train the Isolation Forest (isolation forest) classifier, obtains the best training model, and inputs the test data into the trained model for detec...

Embodiment 2

[0140] The purpose of the present invention is to provide a hardware Trojan detection method based on machine learning in view of the situation in the above background technology, and to solve the problems of high algorithm complexity, long detection time and low For problems such as poor accuracy, PCA (Principal Component Analysis) method is used for dimensionality reduction. While reducing the feature dimension, most of the data information is retained. Use the dimensionality-reduced data to train the Isolation Forest (isolation forest) unsupervised model, and apply training A good best model detects and localizes hardware Trojans.

[0141] To achieve the above object, the present invention adopts the following technical solutions:

[0142] Step S1: Analyze the characteristics of the hardware Trojan horse from the perspective of circuit structure, Trojan horse trigger circuit and load circuit function, combine the circuit features and Trojan horse structure of traditional ma...

Embodiment 3

[0166] refer to figure 2 , the hardware Trojan detection system and the information data processing method based on unsupervised learning that the embodiment of the present invention provides, comprise the following steps:

[0167] Step S1: Analyze the characteristics of the hardware Trojan horse from the perspective of circuit structure, Trojan horse trigger circuit and load circuit function, analyze the difference between the Trojan horse circuit and the normal circuit, associate the characteristic of low trigger probability of the Trojan horse circuit with the static feature, and the design can efficiently detect The circuit characteristics of the hardware Trojan horse circuit.

[0168] The characteristics of the selected Trojan horse are: the number of logic gates out_logic_gate_x, in_logic_gate_x (the value of x is 1, 2, 3, 4, 5) away from the input terminal or output terminal of the net by x levels; The fan-in number of logic gates fan_in_x (the value of x is 1, 2, 3, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of hardware security, and discloses a hardware Trojan horse detection system and an information data processing method based on unsupervised learning, and the method includes analyzing a circuit structure and Trojan horse circuit operation logic, and proposing features required by Trojan horse detection; analzying the importance degrees of the features by combining a random forest, a correlation matrix and a parallel coordinate graph, the features are screened, and obtaining an optimal feature set; performing dimensionality reduction on the high-dimensional data features by adopting a principal component analysis (PCA) method; training an Isolation Forest unsupervised model by adopting the data subjected to dimension reduction to obtain an optimal training model; and testing by adopting test data, calculating parameters such as accuracy according to a test result, and evaluating the model. According to the invention, the majority of information of the data is reserved while the data dimension is reduced, the accuracy is effectively improved, the training time is shortened, and the problem that the label value in the hardware Trojan horse detection field is not easy to obtain or even cannot be obtained is solved by using an unsupervised learning method.

Description

technical field [0001] The invention belongs to the technical field of hardware security, and in particular relates to a hardware Trojan horse detection system and an information data processing method based on unsupervised learning. Background technique [0002] At present, with the rapid development of today's information society and the accelerated application of artificial intelligence technology, people's demand for integrated circuit chips is increasing day by day. However, due to the complexity of the chip design and manufacturing process, chip manufacturers cannot achieve complete autonomy and control over each link, which provides the possibility for some attackers to maliciously modify and destroy integrated circuits. This defect module, which is intentionally manufactured by attackers and inserted into the chip, changes the function or performance of the chip, and is triggered under certain special conditions is called a hardware Trojan. Hardware Trojan horses wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/76
CPCG06F21/76
Inventor 史江义张焱李康潘伟涛董勐王杰温聪陈嘉伟
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products