期刊文献+

基于XGBoost的硬件木马检测方法 被引量:2

Hardware Trojan detection method based upon XGBoost model
下载PDF
导出
摘要 在环形振荡器网络分析的基础上,提出一种基于XGBoost的硬件木马检测方法,并利用交叉验证方法进行模型优化。该方法能够利用训练样本数据集构建XGBoost分类模型,采用监督学习模式对数据进行分类,从而实现将原始电路与木马电路分离的目的。以RS232-T100、RS232-T800为木马电路,进行FPGA实验,实验结果表明:对RO在0. 1 ms积分时间下的木马数据,检测率达到100%、 99. 20%,验证了本方法的有效性。此外,在与传统方法和其他机器学习方法比较时,基于XGBoost的检测方法表现出了更高的检测率,能对多维度向量的关联数据作特征重要性分析,而非降维,能最大限度地保留木马检测所需的关键特征。 This paper proposed a hardware Trojan detection method based upon XGBoost(eXtreme Gradient Boosting)model by using the analysis results of ring oscillator network,and used the cross-validation method to optimize the model.It can utilize that train sample dataset to build the XGBoost classification model,and use the supervised learn mode to classify the data,thus realizing the separation of the original circuit and the Trojan circuit.Using RS232-T100 and RS232-T800 as Trojan circuits,the FPGA experi-ment was carried out.The experimental results showed that the detection rate of the Trojan data with RO at 0.1 ms integration time is 100%and 99.20%,which verified the validity of the method.In addition,when compared with traditional methods and other machine learning methods,the XGBoost-based detection method shows a higher detection rate,and can analyze the character-istic importance of the multi-dimensional vector correlation data instead of dimensionality reduction.It can maximize the key fea-tures required for Trojan detection.
作者 高洪波 李磊 周婉婷 向祎尧 Gao Hongbo;Li Lei;Zhou Wanting;Xiang Yiyao(Research Institute of Electronic Science and Technology,University of Electronic Science and Technology of China,Chengdu 611731,China)
出处 《电子技术应用》 2019年第4期55-59,共5页 Application of Electronic Technique
基金 国家自然科学基金(U1630133) 中央高校基本科研业务费项目(ZYGX2016J185)
关键词 硬件木马 XGBoost 交叉验证 环形振荡器 FPGA hardware Trojan XGBoost cross-validation ring oscillator FPGA
  • 相关文献

参考文献5

二级参考文献36

  • 1苏静,赵毅强,何家骥,刘沈丰.旁路信号主成分分析的欧式距离硬件木马检测[J].微电子学与计算机,2015,32(1):1-4. 被引量:13
  • 2DARPA. Trust in integrated circuits - proposer information pamphlet [EB/OL]. http://www, darpa. mil/M TO/solicitations/baaOT-24/index. html, 2007.
  • 3Defense Science Board. High performance microchip supply [EB/OL]. http://www, acq. osd. mil/dsb/ reports/20 05-02-HPMS Report_Final. pdf, 2005.
  • 4ADEE S. The hunt for the kill switch [J]. IEEE Spectrum, 2008, 45(5): 34-39.
  • 5JIN Y, KUPP N, MAKRIS Y. Experiences in hardware trojan design and implementation [C] // Workshop Hardware-Oriented Security & Trust. San Diego, CA, USA. 2009 : 50-57.
  • 6AGRAWAL D. Trojan detection using IC fingerprinting [C] //Syrup Security & Privacy. San Diego, CA, USA. 2007: 296-310.
  • 7WANG X. Hardware Trojan detection and isolation using current integration and localized current analysis [C] // Syrup Defect & Fault Tolerance VLSI Syst. Grenoble, France. 2008: 87-95.
  • 8RAD R. Power supply signal calibration techniques for improving detection resolution to hardware Trojans [C] //Conf Computer-Aided Des. Santa Clara, CA, DSA. 2008: 632-639.
  • 9LI J, LACH J. At-speed delay characterization for IC authentication and Trojan horse detection [C] // Workshop Hardware-Oriented Security & Trust. Monterey, CA, USA. 2008: 8-14.
  • 10JIN Y, MAKRIS Y. Hardware Trojan detection using path delay fingerprint [C] // Workshop Hardware- Oriented Security & Trust. Monterey, CA, USA. 2008: 51-57.

共引文献31

同被引文献14

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部