Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum
Diamond Microscope Magnetic Field Images
- URL: http://arxiv.org/abs/2204.14228v1
- Date: Fri, 29 Apr 2022 16:57:48 GMT
- Title: Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum
Diamond Microscope Magnetic Field Images
- Authors: Maitreyi Ashok, Matthew J. Turner, Ronald L. Walsworth, Edlyn V.
Levine, Anantha P. Chandrakasan
- Abstract summary: This paper presents a method for hardware trojan detection in integrated circuits.
Unsupervised deep learning is used to classify wide field-of-view (4x4 mm$2$), high spatial resolution magnetic field images taken using a Quantum Diamond Microscope (QDM)
QDM magnetic imaging is enhanced using quantum control techniques and improved diamond material to increase magnetic field sensitivity by a factor of 4 and measurement speed by a factor of 16.
- Score: 3.833120399558056
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: This paper presents a method for hardware trojan detection in integrated
circuits. Unsupervised deep learning is used to classify wide field-of-view
(4x4 mm$^2$), high spatial resolution magnetic field images taken using a
Quantum Diamond Microscope (QDM). QDM magnetic imaging is enhanced using
quantum control techniques and improved diamond material to increase magnetic
field sensitivity by a factor of 4 and measurement speed by a factor of 16 over
previous demonstrations. These upgrades facilitate the first demonstration of
QDM magnetic field measurement for hardware trojan detection. Unsupervised
convolutional neural networks and clustering are used to infer trojan presence
from unlabeled data sets of 600x600 pixel magnetic field images without human
bias. This analysis is shown to be more accurate than principal component
analysis for distinguishing between field programmable gate arrays configured
with trojan free and trojan inserted logic. This framework is tested on a set
of scalable trojans that we developed and measured with the QDM. Scalable and
TrustHub trojans are detectable down to a minimum trojan trigger size of 0.5%
of the total logic. The trojan detection framework can be used for golden-chip
free detection, since knowledge of the chips' identities is only used to
evaluate detection accuracy
Related papers
- Hardware Trojan Detection Potential and Limits with the Quantum Diamond
Microscope [0.0]
The Quantum Diamond Microscope (QDM) is an instrument with a demonstrated capability to image electrical current in integrated circuits (ICs)
This paper seeks to identify the capabilities of the QDM for hardware Trojan detection through the analysis of previous QDM work.
arXiv Detail & Related papers (2024-02-12T19:07:22Z) - Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization [9.889117431225309]
We propose a tamper-resilient integrated on-chip magnetic field sensor array for run-time hardware Trojan detection, localization, and identification.
Using PSA, EM side-channel measurement results collected from sensors at different locations on an IC can be analyzed to localize and identify the Trojan.
The PSA has better performance than conventional external magnetic probes and state-of-the-art on-chip single-coil magnetic field sensors.
arXiv Detail & Related papers (2024-01-22T18:35:02Z) - Uncertainty-Aware Hardware Trojan Detection Using Multimodal Deep
Learning [3.118371710802894]
The risk of hardware Trojans being inserted at various stages of chip production has increased in a zero-trust fabless era.
We propose a multimodal deep learning approach to detect hardware Trojans and evaluate the results from both early fusion and late fusion strategies.
arXiv Detail & Related papers (2024-01-15T05:45:51Z) - TrojanNet: Detecting Trojans in Quantum Circuits using Machine Learning [5.444459446244819]
TrojanNet is a novel approach to enhance the security of quantum circuits by detecting and classifying Trojan-inserted circuits.
We generate 12 diverse datasets by introducing variations in Trojan gate types, the number of gates, insertion locations, and compilers.
Experimental results showcase an average accuracy of 98.80% and an average F1-score of 98.53% in effectively detecting and classifying Trojan-inserted QAOA circuits.
arXiv Detail & Related papers (2023-06-29T05:56:05Z) - Self-Supervised Masked Convolutional Transformer Block for Anomaly
Detection [122.4894940892536]
We present a novel self-supervised masked convolutional transformer block (SSMCTB) that comprises the reconstruction-based functionality at a core architectural level.
In this work, we extend our previous self-supervised predictive convolutional attentive block (SSPCAB) with a 3D masked convolutional layer, a transformer for channel-wise attention, as well as a novel self-supervised objective based on Huber loss.
arXiv Detail & Related papers (2022-09-25T04:56:10Z) - Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips [51.17948837118876]
We present hardly perceptible Trojan attack (HPT)
HPT crafts hardly perceptible Trojan images by utilizing the additive noise and per pixel flow field.
To achieve superior attack performance, we propose to jointly optimize bit flips, additive noise, and flow field.
arXiv Detail & Related papers (2022-07-27T09:56:17Z) - Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free [126.15842954405929]
Trojan attacks threaten deep neural networks (DNNs) by poisoning them to behave normally on most samples, yet to produce manipulated results for inputs attached with a trigger.
We propose a novel Trojan network detection regime: first locating a "winning Trojan lottery ticket" which preserves nearly full Trojan information yet only chance-level performance on clean inputs; then recovering the trigger embedded in this already isolated subnetwork.
arXiv Detail & Related papers (2022-05-24T06:33:31Z) - An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks [25.593824693347113]
Deep Neural Networks (DNNs) have demonstrated unprecedented performance across various fields such as medical diagnosis and autonomous driving.
They are identified to be vulnerable to Neural Trojan (NT) attacks that are controlled and activated by stealthy triggers.
We propose a robust and adaptive Trojan detection scheme that inspects whether a pre-trained model has been Trojaned before its deployment.
arXiv Detail & Related papers (2022-04-08T23:41:19Z) - M2TR: Multi-modal Multi-scale Transformers for Deepfake Detection [74.19291916812921]
forged images generated by Deepfake techniques pose a serious threat to the trustworthiness of digital information.
In this paper, we aim to capture the subtle manipulation artifacts at different scales for Deepfake detection.
We introduce a high-quality Deepfake dataset, SR-DF, which consists of 4,000 DeepFake videos generated by state-of-the-art face swapping and facial reenactment methods.
arXiv Detail & Related papers (2021-04-20T05:43:44Z) - D-Unet: A Dual-encoder U-Net for Image Splicing Forgery Detection and
Localization [108.8592577019391]
Image splicing forgery detection is a global binary classification task that distinguishes the tampered and non-tampered regions by image fingerprints.
We propose a novel network called dual-encoder U-Net (D-Unet) for image splicing forgery detection, which employs an unfixed encoder and a fixed encoder.
In an experimental comparison study of D-Unet and state-of-the-art methods, D-Unet outperformed the other methods in image-level and pixel-level detection.
arXiv Detail & Related papers (2020-12-03T10:54:02Z) - Practical Detection of Trojan Neural Networks: Data-Limited and
Data-Free Cases [87.69818690239627]
We study the problem of the Trojan network (TrojanNet) detection in the data-scarce regime.
We propose a data-limited TrojanNet detector (TND), when only a few data samples are available for TrojanNet detection.
In addition, we propose a data-free TND, which can detect a TrojanNet without accessing any data samples.
arXiv Detail & Related papers (2020-07-31T02:00:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.