Suppr超能文献

一种基于对比学习的硬件木马检测框架。

A framework for hardware trojan detection based on contrastive learning.

作者信息

Jiang Zijing, Ding Qun

机构信息

Electronic Engineering College, Heilongjiang University, Harbin, 150080, China.

出版信息

Sci Rep. 2024 Dec 28;14(1):30847. doi: 10.1038/s41598-024-81473-0.

Abstract

With the rapid development of the semiconductor industry, Hardware Trojans (HT) as a kind of malicious function that can be implanted at will in all processes of integrated circuit design, manufacturing, and deployment have become a great threat in the field of hardware security. Side-channel analysis is widely used in the detection of HT due to its high efficiency, non-contact nature, and accuracy. In this paper, we propose a framework for HT detection based on contrastive learning using power consumption information in unsupervised or weakly supervised scenarios. First, the framework augments the data, such as creatively using a one-dimensional discrete chaotic mapping to disturb the data to achieve data augmentation to improve the generalization capabilities of the model. Second, the model representation is learned by comparing the similarities and differences between samples, freeing it from the dependence on labels. Finally, the detection of HT is accomplished more efficiently by categorizing the side information during circuit operation through the backbone network. Experiments on data from nine different public HTs show that the proposed method exhibits better generalization capabilities using the same network model within a comparative learning framework. The model trained on the dataset of small Trojan T100 has a detection efficiency advantage of up to 44% in detecting large Trojans, while the model trained on the dataset of large Trojan T2100 has a detection efficiency advantage of up to 10% in detecting small Trojans. The results in data imbalanced and noisy environments also show that the contrastive learning framework in this paper can better fulfill the requirements of detecting unknown HT in unsupervised or weakly supervised scenarios.

摘要

随着半导体行业的快速发展,硬件木马(HT)作为一种可在集成电路设计、制造和部署的所有过程中随意植入的恶意功能,已成为硬件安全领域的巨大威胁。由于其高效、非接触性和准确性,侧信道分析在硬件木马检测中被广泛应用。在本文中,我们提出了一种基于对比学习的硬件木马检测框架,该框架在无监督或弱监督场景下使用功耗信息。首先,该框架对数据进行增强,例如创造性地使用一维离散混沌映射来干扰数据以实现数据增强,从而提高模型的泛化能力。其次,通过比较样本之间的异同来学习模型表示,使其摆脱对标签的依赖。最后,通过主干网络对电路运行期间的边信息进行分类,更高效地完成硬件木马的检测。对来自九个不同公共硬件木马的数据进行的实验表明,在对比学习框架内使用相同的网络模型时,所提出的方法具有更好的泛化能力。在小木马T100数据集上训练的模型在检测大木马时具有高达44%的检测效率优势,而在大木马T2100数据集上训练的模型在检测小木马时具有高达10%的检测效率优势。在数据不平衡和有噪声的环境中的结果也表明,本文中的对比学习框架能够更好地满足在无监督或弱监督场景下检测未知硬件木马的要求。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8c12/11680795/8dc6a2c53de2/41598_2024_81473_Fig1_HTML.jpg

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验