Jiang Zijing, Ding Qun
Electronic Engineering College, Heilongjiang University, Harbin, 150080, China.
Sci Rep. 2024 Dec 28;14(1):30847. doi: 10.1038/s41598-024-81473-0.
With the rapid development of the semiconductor industry, Hardware Trojans (HT) as a kind of malicious function that can be implanted at will in all processes of integrated circuit design, manufacturing, and deployment have become a great threat in the field of hardware security. Side-channel analysis is widely used in the detection of HT due to its high efficiency, non-contact nature, and accuracy. In this paper, we propose a framework for HT detection based on contrastive learning using power consumption information in unsupervised or weakly supervised scenarios. First, the framework augments the data, such as creatively using a one-dimensional discrete chaotic mapping to disturb the data to achieve data augmentation to improve the generalization capabilities of the model. Second, the model representation is learned by comparing the similarities and differences between samples, freeing it from the dependence on labels. Finally, the detection of HT is accomplished more efficiently by categorizing the side information during circuit operation through the backbone network. Experiments on data from nine different public HTs show that the proposed method exhibits better generalization capabilities using the same network model within a comparative learning framework. The model trained on the dataset of small Trojan T100 has a detection efficiency advantage of up to 44% in detecting large Trojans, while the model trained on the dataset of large Trojan T2100 has a detection efficiency advantage of up to 10% in detecting small Trojans. The results in data imbalanced and noisy environments also show that the contrastive learning framework in this paper can better fulfill the requirements of detecting unknown HT in unsupervised or weakly supervised scenarios.
随着半导体行业的快速发展,硬件木马(HT)作为一种可在集成电路设计、制造和部署的所有过程中随意植入的恶意功能,已成为硬件安全领域的巨大威胁。由于其高效、非接触性和准确性,侧信道分析在硬件木马检测中被广泛应用。在本文中,我们提出了一种基于对比学习的硬件木马检测框架,该框架在无监督或弱监督场景下使用功耗信息。首先,该框架对数据进行增强,例如创造性地使用一维离散混沌映射来干扰数据以实现数据增强,从而提高模型的泛化能力。其次,通过比较样本之间的异同来学习模型表示,使其摆脱对标签的依赖。最后,通过主干网络对电路运行期间的边信息进行分类,更高效地完成硬件木马的检测。对来自九个不同公共硬件木马的数据进行的实验表明,在对比学习框架内使用相同的网络模型时,所提出的方法具有更好的泛化能力。在小木马T100数据集上训练的模型在检测大木马时具有高达44%的检测效率优势,而在大木马T2100数据集上训练的模型在检测小木马时具有高达10%的检测效率优势。在数据不平衡和有噪声的环境中的结果也表明,本文中的对比学习框架能够更好地满足在无监督或弱监督场景下检测未知硬件木马的要求。