A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework

Xue Yang, Congming Wei*, Yaoling Ding, Shaofei Sun, An Wang, Jiazhe Chen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Hardware Trojans have become a major challenge to ICs due to their serious damage to the reliability and security. However, hardware Trojans can be activated in a variety of ways, making accurate activation of hidden hardware Trojans extremely difficult. In this paper, we propose an automatic anomaly detection method based on LUNAR (Learnable Unified Neighborhood-based Anomaly Ranking) based on graph neural networks to efficiently, quickly, accurately, and automatically detect unknown commands secretly inserted by untrusted parties. This method could effectively detect the command-activated hardware Trojans, which are the most frequently used activation mode. While retaining the linear time complexity advantage of PBCS (Pruning Bytes Command Search), we try to use neighbor information in a trainable way to find anomalies in each node, which could effectively reduce manual intervention in unsupervised conditions. Our experiments mainly focus on the preprocessed waveform sets with obvious features, Gaussian noise waveform sets with weak features, and original waveform sets without any obvious features. The results show that the LUNAR framework can detect anomalies significantly better than One-Class SVM, Isolation Forest and Local Outlier Factor, which are easily affected by parameter adjustment, especially in scenarios with no preprocessing and no obvious features.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security Workshops - ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Proceedings
EditorsMartin Andreoni
PublisherSpringer Science and Business Media Deutschland GmbH
Pages340-358
Number of pages19
ISBN (Print)9783031614859
DOIs
Publication statusPublished - 2024
EventSatellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024 - Abu Dhabi, United Arab Emirates
Duration: 5 Mar 20248 Mar 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14586 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceSatellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi
Period5/03/248/03/24

Keywords

  • Graph Neural Network
  • Hardware Trojan Detection
  • Side Channel Analysis

Fingerprint

Dive into the research topics of 'A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework'. Together they form a unique fingerprint.

Cite this