Hardware Trojan Detection Using Thermal Imaging in FPGAs with Combined Features

Milad Pazira, Y. Baleghi, Abouzar Akbari
{"title":"Hardware Trojan Detection Using Thermal Imaging in FPGAs with Combined Features","authors":"Milad Pazira, Y. Baleghi, Abouzar Akbari","doi":"10.1109/ICSPIS54653.2021.9729357","DOIUrl":null,"url":null,"abstract":"A Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit. The importance of Hardware Trojan detection increases with increase in the complexity of integrated circuits. The possible effects of the insertion of a Hardware Trojan involve a range of harms from leakage of sensitive information to the complete destruction of the integrated circuit itself. Non-invasive methods of Hardware Trojan detection are divided into two general categories: performance testing and side channel analysis. Hardware Trojan detection using thermal imagery is one of the side channel analysis methods which have recently been considered. In this paper, we propose a Hardware Trojan detection method on FPGA, based on thermal image processing of defected and authentic chips assuming that a golden chip is available. We also provide a dataset of thermal images captured from multiple experiments on a certain FPGA board. Each experiment contains 12 images taken in 55 seconds of working FPGA. The Hardware Trojan detection method relies on extracting two different features from images and detecting the presence of a Hardware Trojan using machine learning techniques. Results shows that if proposed method is combined with a basic method, hardware Trojan detection accuracy can be increased, significantly.","PeriodicalId":286966,"journal":{"name":"2021 7th International Conference on Signal Processing and Intelligent Systems (ICSPIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 7th International Conference on Signal Processing and Intelligent Systems (ICSPIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSPIS54653.2021.9729357","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

A Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit. The importance of Hardware Trojan detection increases with increase in the complexity of integrated circuits. The possible effects of the insertion of a Hardware Trojan involve a range of harms from leakage of sensitive information to the complete destruction of the integrated circuit itself. Non-invasive methods of Hardware Trojan detection are divided into two general categories: performance testing and side channel analysis. Hardware Trojan detection using thermal imagery is one of the side channel analysis methods which have recently been considered. In this paper, we propose a Hardware Trojan detection method on FPGA, based on thermal image processing of defected and authentic chips assuming that a golden chip is available. We also provide a dataset of thermal images captured from multiple experiments on a certain FPGA board. Each experiment contains 12 images taken in 55 seconds of working FPGA. The Hardware Trojan detection method relies on extracting two different features from images and detecting the presence of a Hardware Trojan using machine learning techniques. Results shows that if proposed method is combined with a basic method, hardware Trojan detection accuracy can be increased, significantly.
结合fpga的热成像硬件木马检测
硬件木马(Hardware Trojan, HT)是一种对集成电路进行恶意修改的程序。硬件木马检测的重要性随着集成电路复杂度的增加而增加。插入硬件木马的可能后果包括一系列危害,从泄露敏感信息到完全破坏集成电路本身。硬件木马的非侵入性检测方法分为两大类:性能测试和侧信道分析。利用热成像技术检测硬件木马是近年来研究的边信道分析方法之一。本文提出了一种基于FPGA的硬件木马检测方法,该方法基于对缺陷芯片和正版芯片的热图像处理,假设有金芯片可用。我们还提供了在特定FPGA板上从多个实验中捕获的热图像数据集。每个实验包含在FPGA工作的55秒内拍摄的12张图像。硬件木马检测方法依赖于从图像中提取两个不同的特征,并使用机器学习技术检测硬件木马的存在。结果表明,将该方法与一种基本方法相结合,可以显著提高硬件木马的检测精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信