{"title":"基于卷积神经网络的木马检测","authors":"P. Umamaheswari, J. Selvakumar","doi":"10.1109/ICCMC53470.2022.9753855","DOIUrl":null,"url":null,"abstract":"As machine learning becomes more popular and computing power is increasingly needed, hardware-optimized neural networks and other learning models are increasingly needed. In the course of technology's evolution, machine learning and artificial intelligence will also likely be well trained in the near term. The modern fabulous production hardware business model leads unfortunately to security deficiencies throughout the supply chain and to economics. In this article, these safety problems are emphasized through the introduction of Trojan hardware attacks on neural networks to expand the current neural network security taxonomy. This paper proposes the development of a new framework to insert malicious trojans into a classifier application for the neural network. An algorithm using a convolutional neural network is used to evaluate the ability, if this algorithm adds 0.03 percent trojan, it can effectively classify an input gauge as a cluster in any convolution neural network with seven layers. Finally, this work is about the potential defense against hardware Trojan attacks to protect neural networks.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Trojan Detection using Convolutional Neural Network\",\"authors\":\"P. Umamaheswari, J. Selvakumar\",\"doi\":\"10.1109/ICCMC53470.2022.9753855\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As machine learning becomes more popular and computing power is increasingly needed, hardware-optimized neural networks and other learning models are increasingly needed. In the course of technology's evolution, machine learning and artificial intelligence will also likely be well trained in the near term. The modern fabulous production hardware business model leads unfortunately to security deficiencies throughout the supply chain and to economics. In this article, these safety problems are emphasized through the introduction of Trojan hardware attacks on neural networks to expand the current neural network security taxonomy. This paper proposes the development of a new framework to insert malicious trojans into a classifier application for the neural network. An algorithm using a convolutional neural network is used to evaluate the ability, if this algorithm adds 0.03 percent trojan, it can effectively classify an input gauge as a cluster in any convolution neural network with seven layers. Finally, this work is about the potential defense against hardware Trojan attacks to protect neural networks.\",\"PeriodicalId\":345346,\"journal\":{\"name\":\"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMC53470.2022.9753855\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC53470.2022.9753855","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trojan Detection using Convolutional Neural Network
As machine learning becomes more popular and computing power is increasingly needed, hardware-optimized neural networks and other learning models are increasingly needed. In the course of technology's evolution, machine learning and artificial intelligence will also likely be well trained in the near term. The modern fabulous production hardware business model leads unfortunately to security deficiencies throughout the supply chain and to economics. In this article, these safety problems are emphasized through the introduction of Trojan hardware attacks on neural networks to expand the current neural network security taxonomy. This paper proposes the development of a new framework to insert malicious trojans into a classifier application for the neural network. An algorithm using a convolutional neural network is used to evaluate the ability, if this algorithm adds 0.03 percent trojan, it can effectively classify an input gauge as a cluster in any convolution neural network with seven layers. Finally, this work is about the potential defense against hardware Trojan attacks to protect neural networks.