Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs
-
Published:2024-08-08
Issue:3
Volume:8
Page:36
-
ISSN:2410-387X
-
Container-title:Cryptography
-
language:en
-
Short-container-title:Cryptography
Author:
Dofe Jaya1ORCID, Danesh Wafi2, More Vaishnavi1, Chaudhari Aaditya1
Affiliation:
1. Department of Electrical and Computer Engineering, California State University, Fullerton, CA 92831, USA 2. Division of Engineering Program, The State University of New York, New Paltz, NY 12561, USA
Abstract
Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime, making them ideal for applications such as data centers, cloud computing, and edge computing. This reconfiguration, often achieved through remote access, enables efficient resource utilization but also introduces critical security vulnerabilities. An adversary could exploit this access to insert a dormant hardware trojan (HT) into the configuration bitstream, bypassing conventional security and verification measures. To address this security threat, we propose a supervised learning approach using deep recurrent neural networks (RNNs) for HT detection within FPGA configuration bitstreams. We explore two RNN architectures: basic RNN and long short-term memory (LSTM) networks. Our proposed method analyzes bitstream patterns, to identify anomalies indicative of malicious modifications. We evaluated the effectiveness on ISCAS 85 benchmark circuits of varying sizes and topologies, implemented on a Xilinx Artix-7 FPGA. The experimental results revealed that the basic RNN model showed lower accuracy in identifying HT-compromised bitstreams for most circuits. In contrast, the LSTM model achieved a significantly higher average accuracy of 93.5%. These results demonstrate that the LSTM model is more successful for HT detection in FPGA bitstreams. This research paves the way for using RNN architectures for HT detection in FPGAs, eliminating the need for time-consuming and resource-intensive reverse engineering or performance-degrading bitstream conversions.
Reference49 articles.
1. Rajput, S., Dofe, J., and Danesh, W. (2023, January 5–7). Automating Hardware Trojan Detection Using Unsupervised Learning: A Case Study of FPGA. Proceedings of the 2023 24th International Symposium on Quality Electronic Design (ISQED), San Francisco, CA, USA. 2. Elnawawy, M., Farhan, A., Nabulsi, A.A., Al-Ali, A., and Sagahyroon, A. (2019, January 10–12). Role of FPGA in Internet of Things Applications. Proceedings of the 2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Ajman, United Arab Emirates. 3. Fahmy, S.A., Vipin, K., and Shreejith, S. (December, January 30). Virtualized FPGA Accelerators for Efficient Cloud Computing. Proceedings of the 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), Vancouver, BC, Canada. 4. Zeitouni, S., Vliegen, J., Frassetto, T., Koch, D., Sadeghi, A.R., and Mentens, N. (2021, January 9–12). Trusted Configuration in Cloud FPGAs. Proceedings of the 2021 IEEE 29th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), Orlando, FL, USA. 5. System-on-Chip FPGA Devices for Complex Electrical Energy Systems Control;Monmasson;IEEE Ind. Electron. Mag.,2022
|
|