A Few Shot Learning based Approach for Hardware Trojan Detection using Deep Siamese CNN

Hardware Trojan (HT) is the primary concern for the semiconductor industries due to the involvement of external vendors in the integrated circuit (IC) design. Recently various Machine learning (ML) based HT detection techniques have been reported to automate the detection process. However, the major problem of applying ML algorithms in HT detection is the lack of standard large IC dataset, lack of relevant features, and class imbalance, which largely affects the detection performance. Therefore, this paper proposes a new HT detection technique, based on a few-shot learning and Deep Siamese CNN model that detects the HT from IC layout images. A new DCNN model-based architecture is proposed, which contains three convolutional and pooling layers that automatically extracts the invariant and relevant features from the IC images. Further, a new architecture based on the deep Siamese CNN (DSCNN) model is also proposed, which utilizes the same DCNN model twice and generates the similarity score based on the extracted image features for detection. The proposed DSCNN model is initially trained with a small synthetic ISCAS-85 dataset and then validated and tested with the unseen ISCAS-89 and Trust-Hub datasets, containing few samples per class. Finally, a new HT detection algorithm is proposed, which utilizes the two proposed models to perform the detection. Experimental results on synthetic ISCAS-89 and Trust- Hub datasets shows that the proposed technique achieves high detection accuracy in the presence of a few samples.

[1]  Damon L. Woodard,et al.  Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives , 2020, ArXiv.

[2]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[3]  Qiang Liu,et al.  A survey of hardware Trojan threat and defense , 2016, Integr..

[4]  Ajay Joshi,et al.  Detecting Hardware Trojans using backside optical imaging of embedded watermarks , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[5]  Ankur Srivastava,et al.  On Reverse Engineering-Based Hardware Trojan Detection , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[6]  Yann LeCun,et al.  Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..

[7]  Nidish Vashistha,et al.  Trojan Scanner: Detecting Hardware Trojans with Rapid SEM Imaging Combined with Image Processing and Machine Learning , 2018, ISTFA 2018: Conference Proceedings from the 44th International Symposium for Testing and Failure Analysis.

[8]  Mark Mohammad Tehranipoor,et al.  Detecting Hardware Trojans Inserted by Untrusted Foundry Using Physical Inspection and Advanced Image Processing , 2018, Journal of Hardware and Systems Security.

[9]  Xiaohong Jiang,et al.  A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges , 2020, IEEE Access.

[10]  Assia Tria,et al.  SEMBA: A SEM based acquisition technique for fast invasive Hardware Trojan detection , 2015, 2015 European Conference on Circuit Theory and Design (ECCTD).

[11]  Abdurrahman A. Nasr,et al.  Automatic Feature Selection of Hardware Layout: A Step toward Robust Hardware Trojan Detection , 2016, J. Electron. Test..

[12]  Mark Mohammad Tehranipoor,et al.  On design vulnerability analysis and trust benchmarks development , 2013, 2013 IEEE 31st International Conference on Computer Design (ICCD).

[13]  Ankur Srivastava,et al.  On application of one-class SVM to reverse engineering-based hardware Trojan detection , 2014, Fifteenth International Symposium on Quality Electronic Design.

[14]  Nan Chen,et al.  Wafer Map Defect Pattern Recognition Using Rotation-Invariant Features , 2019, IEEE Transactions on Semiconductor Manufacturing.

[15]  Yu-Chiang Frank Wang,et al.  A Closer Look at Few-shot Classification , 2019, ICLR.

[16]  Assia Tria,et al.  A high efficiency Hardware Trojan detection technique based on fast SEM imaging , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[17]  Abdurrahman A. Nasr,et al.  An Efficient Reverse Engineering Hardware Trojan Detector Using Histogram of Oriented Gradients , 2017, J. Electron. Test..