Skip to main content

2018 | OriginalPaper | Buchkapitel

Detection Method of Hardware Trojan Based on Wavelet Noise Reduction and Neural Network

verfasst von : Xiaopeng Li, Fei Xiao, Ling Li, Jiangjiang Shen, Fengchen Qian

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As there are multiple noise exist in data acquisition of chip power consumption, in order to ensure the reliability of the data, a circuit with Trojan logic is written in FPGA and the power consumption data is extracted based on AES circuit. Aiming at the influence of noise on hardware Trojan detection, a power reduction algorithm based on wavelet transform is proposed, and the optimal parameters are chosen to reduce the noise effects. To solve the problem that the feature recognition model has a great influence on the accuracy of the detection in the process of chip normal detection and hardware Trojan recognition, a hardware Trojan recognition algorithm based on neural network is proposed, which can distinguish the data from each other and detect the Trojan after data de-noising. According to the experiment, it shows that the identification rate of hardware Trojan in chip is larger than 90%, and the consumption data which size greater than 0.05% can be identified.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jacob, N., Merli, D.: Hardware Trojan: current challenges and approaches. IET Comput. Digit. Tech. 8(6), 264–273 (2014)CrossRef Jacob, N., Merli, D.: Hardware Trojan: current challenges and approaches. IET Comput. Digit. Tech. 8(6), 264–273 (2014)CrossRef
2.
Zurück zum Zitat Ni, L., Li, S., Ma, R., Wei, P.: Hardware Trojans detection and protection. Digit. Commun. 41(1), 59–63 (2014) Ni, L., Li, S., Ma, R., Wei, P.: Hardware Trojans detection and protection. Digit. Commun. 41(1), 59–63 (2014)
3.
Zurück zum Zitat Xu, Q., Jiang, X., Yao, L., Zhang, Z., Zhang, C.: Overview of the detection and prevention study of hardware Trojans. Chin. J. Netw. Inf. Secur. 3(4), 1–13 (2017) Xu, Q., Jiang, X., Yao, L., Zhang, Z., Zhang, C.: Overview of the detection and prevention study of hardware Trojans. Chin. J. Netw. Inf. Secur. 3(4), 1–13 (2017)
4.
Zurück zum Zitat Wang, L., Luo, H., Yao, R.: Side-channel analysis-based detection approach of hardware Trojans. J. South China Univ. Technol. (Nat. Sci. Ed.) 40(6), 6–10 (2012) Wang, L., Luo, H., Yao, R.: Side-channel analysis-based detection approach of hardware Trojans. J. South China Univ. Technol. (Nat. Sci. Ed.) 40(6), 6–10 (2012)
5.
Zurück zum Zitat Zhao, Z., Ni, L., Li, S.: Detection method of hardware Trojans power consumption. J. Beijing Univ. Posts Telecommun. 38(4), 128–132 (2015) Zhao, Z., Ni, L., Li, S.: Detection method of hardware Trojans power consumption. J. Beijing Univ. Posts Telecommun. 38(4), 128–132 (2015)
6.
Zurück zum Zitat Li, H., Zhao, Y., Yang, R., et al.: Hardware Trojan detection optimization based on wavelet de-noising data preprocessing. Comput. Eng. Appl. 53(1), 49–53 (2017) Li, H., Zhao, Y., Yang, R., et al.: Hardware Trojan detection optimization based on wavelet de-noising data preprocessing. Comput. Eng. Appl. 53(1), 49–53 (2017)
7.
Zurück zum Zitat Wang, X., Salmani, H., Tehranipoor, M., et al.: Hardware Trojan detection and isolation using current integration and localized current analysis. In: Proceedings of IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems, pp. 87–95. IEEE Computer Society, Washington, DC (2008) Wang, X., Salmani, H., Tehranipoor, M., et al.: Hardware Trojan detection and isolation using current integration and localized current analysis. In: Proceedings of IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems, pp. 87–95. IEEE Computer Society, Washington, DC (2008)
9.
Zurück zum Zitat Wang, J., Wang, B., Qu, M., Zhang, L.: Hardware Trojan detection based on naive Bayesian classifier. Appl. Res. Comput. 34(10), 3073–3076 (2017) Wang, J., Wang, B., Qu, M., Zhang, L.: Hardware Trojan detection based on naive Bayesian classifier. Appl. Res. Comput. 34(10), 3073–3076 (2017)
Metadaten
Titel
Detection Method of Hardware Trojan Based on Wavelet Noise Reduction and Neural Network
verfasst von
Xiaopeng Li
Fei Xiao
Ling Li
Jiangjiang Shen
Fengchen Qian
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00018-9_23