A machine learning based golden-free detection method for command-activated hardware Trojan

Ning Shang, An Wang*, Yaoling Ding, Keke Gai, Liehuang Zhu, Guoshuang Zhang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

15 Citations (Scopus)

Abstract

Hardware Trojan detection has been becoming an attentive research subject since the first Trojan in real-world hardware was found. A common way to activate a hardware Trojan is to send a command, and detecting those command-activated Trojan is one of the significant dimensions in securing hardware. In this paper, we propose a novel chip-free detection method, called Pruning Bytes Command Search (PBCS), which is a machine learning-based approach and can efficiently find out command-activate hardware Trojans. The proposed PBCS has been evaluated in experimental environments (via micro-controller) and real-world validations (on smart cards). Our approach also combines with novelty detection and outlier detection methods and examines effects on One-Class Support Vector Machine, Local Outlier Factor, and Isolation Forest as distinguishers in five scenes, respectively. The findings of the evaluation show that our approach is competent for searching unknown commands. Accuracy performance can be enhanced when proper distinguishers are selected. The results demonstrate that PBCS can successfully find out all executable commands in an uncertain parsing path hardware, which implies our approach is applicable in the complicated context.

Original languageEnglish
Pages (from-to)292-307
Number of pages16
JournalInformation Sciences
Volume540
DOIs
Publication statusPublished - Nov 2020

Keywords

  • Chip-free
  • Hardware Trojan detection
  • Novelty detection
  • Outlier detection
  • PBCS
  • Power analysis

Fingerprint

Dive into the research topics of 'A machine learning based golden-free detection method for command-activated hardware Trojan'. Together they form a unique fingerprint.

Cite this