Javascript must be enabled to continue!
A Siamese deep learning framework for efficient hardware Trojan detection using power side-channel data
View through CrossRef
AbstractHardware Trojans (HTs) are hidden threats embedded in the circuitry of integrated circuits (ICs), enabling unauthorized access, data theft, operational disruptions, or even physical harm. Detecting Hardware Trojans (HTD) is paramount for ensuring IC security. This paper introduces a novel Siamese neural network (SNN) framework for non-destructive HTD. The proposed framework can detect HTs by processing power side-channel signals without the need for a golden model of the IC. To obtain the best results, different neural network models such as Convolutional Neural Network (CNN), Gated Recurrent Unit (GRU), and Long Short-Term Memory (LSTM) are integrated individually with SNN. These models are trained on the extracted features from the Trojan Power & EM Side-Channel dataset. The results show that the Siamese LSTM model achieved the highest accuracy of 86.78%, followed by the Siamese GRU model with 83.59% accuracy and the Siamese CNN model with 73.54% accuracy. The comparison shows that of the proposed Siamese LSTM is a promising new approach for HTD and outperform the state-of-the-art methods.
Springer Science and Business Media LLC
Title: A Siamese deep learning framework for efficient hardware Trojan detection using power side-channel data
Description:
AbstractHardware Trojans (HTs) are hidden threats embedded in the circuitry of integrated circuits (ICs), enabling unauthorized access, data theft, operational disruptions, or even physical harm.
Detecting Hardware Trojans (HTD) is paramount for ensuring IC security.
This paper introduces a novel Siamese neural network (SNN) framework for non-destructive HTD.
The proposed framework can detect HTs by processing power side-channel signals without the need for a golden model of the IC.
To obtain the best results, different neural network models such as Convolutional Neural Network (CNN), Gated Recurrent Unit (GRU), and Long Short-Term Memory (LSTM) are integrated individually with SNN.
These models are trained on the extracted features from the Trojan Power & EM Side-Channel dataset.
The results show that the Siamese LSTM model achieved the highest accuracy of 86.
78%, followed by the Siamese GRU model with 83.
59% accuracy and the Siamese CNN model with 73.
54% accuracy.
The comparison shows that of the proposed Siamese LSTM is a promising new approach for HTD and outperform the state-of-the-art methods.
Related Results
En skvatmølle i Ljørring
En skvatmølle i Ljørring
A Horizontal Mill at Ljørring, Jutland.Horizontal water-mills have been in use in Jutland since the beginning of the Christian era 2). But the one here described shows so close a c...
A Siamese Deep Learning Framework for Efficient Hardware Trojan Detection Using Power Side-Channel Data
A Siamese Deep Learning Framework for Efficient Hardware Trojan Detection Using Power Side-Channel Data
Abstract
Hardware Trojans (HTs) are malicious alterations to the circuitry of integrated circuits (ICs), enabling unauthorized access, data theft, operational disruptions, ...
Land Cover Change Detection using M Siamese Network
Land Cover Change Detection using M Siamese Network
Land cover change detection has been a topic of active research in the remote sensing community. Due to enormous amount of data available from satellites. The land cover change det...
Survey on Hardware Security: PUFs, Trojans, and Side-Channel Attacks
Survey on Hardware Security: PUFs, Trojans, and Side-Channel Attacks
The increasing reliance on hardware technologies across critical sectors such as healthcare, defense, automotive, and finance has raised awareness of vulnerabilities in these syste...
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
The rapid expansion of the fintech sector has brought with it an increasing demand for robust and sophisticated fraud detection systems capable of managing large volumes of financi...
Pengaruh Konsentrasi Sukrosa terhadap Karakteristik Wine Jeruk Siam Kintamani (Citrus nobilis L.)
Pengaruh Konsentrasi Sukrosa terhadap Karakteristik Wine Jeruk Siam Kintamani (Citrus nobilis L.)
Kintamani Siamese oranges are one of Bali’s local fruits. There is a problem during harvest season, namely the price of oranges falls due to oversupply. To solve the problem, it is...
Performance simulation methodologies for hardware/software co-designed processors
Performance simulation methodologies for hardware/software co-designed processors
Recently the community started looking into Hardware/Software (HW/SW) co-designed processors as potential solutions to move towards the less power consuming and the less complex de...
Siamese tones in the late 16th century as reflected in the Sino-Siamese Manual of Translation
Siamese tones in the late 16th century as reflected in the Sino-Siamese Manual of Translation
Abstract
This study aims to reconstruct the tone system of late 16th century Siamese by analyzing the Sino-Siamese
Manual of Translation. The compilers’ preference for tr...

