MacLeR: Machine Learning-Based Runtime Hardware Trojan Detection in Resource-Constrained IoT Edge Devices

Traditional learning-based approaches for runtime hardware Trojan (HT) detection require complex and expensive on-chip data acquisition frameworks, and thus incur high area and power overhead. To address these challenges, we propose to leverage the power correlation between the executing instructions of a microprocessor to establish a machine learning (ML)-based runtime HT detection framework, called MacLeR. To reduce the overhead of data acquisition, we propose a single power-port current acquisition block using current sensors in time-division multiplexing, which increases accuracy while incurring reduced area overhead. We have implemented a practical solution by analyzing multiple HT benchmarks inserted in the RTL of a system-on-chip (SoC) consisting of four LEON3 processors integrated with other IPs, such as vga_lcd, RSA, AES, Ethernet, and memory controllers. Our experimental results show that compared to state-of-the-art HT detection techniques, MacLeR achieves 10% better HT detection accuracy (i.e., 96.256%) while incurring a $7\times $ reduction in area and power overhead (i.e., 0.025% of the area of the SoC and < 0.07% of the power of the SoC). In addition, we also analyze the impact of process variation (PV) and aging on the extracted power profiles and the HT detection accuracy of MacLeR. Our analysis shows that variations in fine-grained power profiles due to the HTs are significantly higher compared to the variations in fine-grained power profiles caused by the PVs and aging effects. Moreover, our analysis demonstrates that on average, the HT detection accuracy drops in MacLeR is less than 1% and 9% when considering only PV and PV with worst case aging, respectively, which is $\approx 10\times $ less than in the case of the state-of-the-art ML-based HT detection technique.

[1]  Muhammad Shafique,et al.  SIMCom: Statistical sniffing of inter-module communications for runtime hardware trojan detection , 2020, Microprocess. Microsystems.

[2]  Benedikt Huber,et al.  Patmos: a time-predictable microprocessor , 2018, Real-Time Systems.

[3]  Faiq Khalid,et al.  Behavior profiling of power distribution networks for runtime hardware trojan detection , 2017, 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS).

[4]  Muhammad Shafique,et al.  Intelligent Security Measures for Smart Cyber Physical Systems , 2018, 2018 21st Euromicro Conference on Digital System Design (DSD).

[5]  M. Tehranipoor,et al.  Hardware Trojans: Lessons Learned after One Decade of Research , 2016, TODE.

[6]  Muhammad Shafique,et al.  Hayat: Harnessing Dark Silicon and variability for aging deceleration and balancing , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[7]  Tinoosh Mohsenin,et al.  Adaptive real-time Trojan detection framework through machine learning , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[8]  Yu Wang,et al.  Hardware Trojan Detection in Third-Party Digital Intellectual Property Cores by Multilevel Feature Analysis , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[9]  Luca Benini,et al.  GAP-8: A RISC-V SoC for AI at the Edge of the IoT , 2018, 2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP).

[10]  Omar S. Elkeelany,et al.  Self-triggering hardware trojan: Due to NBTI related aging in 3-D ICs , 2017, Integr..

[11]  Ankur Srivastava,et al.  On application of one-class SVM to reverse engineering-based hardware Trojan detection , 2014, Fifteenth International Symposium on Quality Electronic Design.

[12]  Wei He,et al.  Supervised and unsupervised machine learning for side-channel based Trojan detection , 2016, 2016 IEEE 27th International Conference on Application-specific Systems, Architectures and Processors (ASAP).

[13]  Sylvain Guilley,et al.  Hardware Trojan detection by delay and electromagnetic measurements , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[14]  Hong Zhao,et al.  Applying chaos theory for runtime Hardware Trojan detection , 2015, 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).

[15]  Sri Parameswaran,et al.  TrojanGuard: Simple and effective hardware Trojan mitigation techniques for Pipelined MPSoCs , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).

[16]  Melanie Hartmann,et al.  Design Of Analog Cmos Integrated Circuits , 2016 .

[17]  Axel Jantsch,et al.  TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint , 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[18]  Qiang Liu,et al.  A survey of hardware Trojan threat and defense , 2016, Integr..

[19]  N Mohankumar,et al.  Delay-Based Reference Free Hardware Trojan Detection Using Virtual Intelligence , 2018 .

[20]  Osman Hasan,et al.  Hardware Trojan detection in soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline , 2014, 2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS).

[21]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[22]  Benjamin Carrión Schäfer,et al.  Trust Filter: Runtime Hardware Trojan Detection in Behavioral MPSoCs , 2017, J. Hardw. Syst. Secur..

[23]  Mark Mohammad Tehranipoor,et al.  Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution , 2013, IEEE Design & Test.

[24]  Josep Torrellas,et al.  Facelift: Hiding and slowing down aging in multicores , 2008, 2008 41st IEEE/ACM International Symposium on Microarchitecture.

[25]  Muhammad Shafique,et al.  dTune: Leveraging reliable code generation for adaptive dependability tuning under process variation and aging-induced effects , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).

[26]  Hu He,et al.  R2D2: Runtime reassurance and detection of A2 Trojan , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[27]  Krishnendu Chakrabarty,et al.  Machine Learning for Hardware Security: Opportunities and Risks , 2018, Journal of Electronic Testing.

[28]  Ankur Srivastava,et al.  On Reverse Engineering-Based Hardware Trojan Detection , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[29]  Osman Hasan,et al.  Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.

[30]  Michael Hutter,et al.  EM-based detection of hardware trojans on FPGAs , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[31]  Faiq Khalid,et al.  A self-learning framework to detect the intruded integrated circuits , 2016, 2016 IEEE International Symposium on Circuits and Systems (ISCAS).

[32]  Omar S. Elkeelany,et al.  Hardware trojans in 3-D ICs due to NBTI effects and countermeasure , 2017, Integr..

[33]  Muhammad Shafique,et al.  A Roadmap Toward the Resilient Internet of Things for Cyber-Physical Systems , 2018, IEEE Access.

[34]  Franziska Hoffmann,et al.  Design Of Analog Cmos Integrated Circuits , 2016 .

[35]  Yiqiang Zhao,et al.  Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[36]  Yier Jin,et al.  On-Chip Analog Trojan Detection Framework for Microprocessor Trustworthiness , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[37]  Faiq Khalid,et al.  Runtime hardware Trojan monitors through modeling burst mode communication using formal verification , 2018, Integr..

[38]  Ramesh Karri,et al.  Hardware Trojan Detection Using the Order of Path Delay , 2018, ACM J. Emerg. Technol. Comput. Syst..

[39]  Corporate SPARC architecture manual - version 8 , 1992 .

[40]  N. Mohankumar,et al.  Wire Load Variation-Based Hardware Trojan Detection Using Machine Learning Techniques , 2019 .

[41]  Xiaohong Jiang,et al.  A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges , 2020, IEEE Access.