4.6 Article

Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer

Journal

JOURNAL OF SYSTEMS ARCHITECTURE
Volume 128, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.sysarc.2022.102543

Keywords

CAD; Hardware security; Hardware Trojans; Machine learning; Microprocessors; RISC-V; SRAM-based FPGA

Funding

  1. Spanish Agencia Estatal de Investigacion (AEI) [PID2019-104207RB-I00, RED2018-102585-T, P2018/TCS-4496]
  2. Madrid Community research [6G-INTEGRATION-3 TSI-063000-2021-127]

Ask authors/readers for more resources

This paper investigates the ability of Machine Learning (ML) to detect Hardware Trojan Horses (HTHs) introduced by CAD tools in microprocessor softcore designs implemented onto SRAM-based FPGAs. A comparative analysis of various ML models is conducted, indicating that many of them achieve accuracy above 98% and kappa values above 0.97. By identifying the most effective ML models and features, this study lays the foundation for the integration of an ML-based bitstream verification flow.
Software exploitable Hardware Trojan Horses (HTHs) inserted into commercial CPUs allow the attacker to run his/her own software or to gain unauthorized privileges. Recently a novel menace raised: HTHs inserted by CAD tools. A consequence of such scenario is that HTHs must be considered a serious threat not only by academy but also by industry. In this paper we try to answer to the following question: can Machine Learning (ML) help designers of microprocessor softcores implemented onto SRAM-based FPGAs at detecting HTHs introduced by the employed CAD tool during the generation of the bitstream? We present a comparative analysis of the ability of several ML models at detecting the presence of HTHs in the bitstream by exploiting a previously performed characterization of the microprocessor softcore and an associated ML training. An experimental analysis has been carried out targeting the IBEX RISC-V microprocessor running a set of benchmark programs. A detailed comparison of multiple ML models is conducted, showing that many of them achieve accuracy above 98%, and kappa values above 0.97. By identifying the most effective ML models and the best features to be employed, this paper lays the foundation for the integration of a ML-based bitstream verification flow.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Hardware & Architecture

Fault Impact Estimation for Lightweight Fault Detection in Image Filtering

Cristiana Bolchini, Giacomo Boracchi, Luca Cassano, Antonio Miele, Diego Stucchi

Summary: This article presents a novel fault-detection approach for image filtering, using an approximate computing strategy combined with image quality assessment metrics and machine learning models to assess the visual impact of faults in a lightweight manner. Experimental results demonstrate the effectiveness of this approach.

IEEE TRANSACTIONS ON COMPUTERS (2022)

Article Computer Science, Hardware & Architecture

All-optical aggregation and distribution of traffic in large metropolitan area networks using multi-Tb/s S-BVTs

Mariangela Rapisarda, Jose Alberto Hernandez, Alberto Gatto, Paola Parolari, Pierpaolo Boffi, Michela Svaluto Moreolo, Josep Maria Fabrega, Laia Nadal, Ricardo Martinez, Victor Lopez, Juan-Pedro Fernandez-Palacios, Gabriel Otero, David Larrabeiti

Summary: This paper proposes an alternative metropolitan area network architecture based on sliceable bandwidth/bitrate variable transceivers. The approach enables traffic aggregation from multiple edges and cost reduction through IP offloading. Simulation results demonstrate the viability and applicability of this technique in large metro networks.

JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING (2022)

Article Computer Science, Hardware & Architecture

DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN

Luca Cassano, Mattia Iamundo, Tomas Antonio Lopez, Alessandro Nazzari, Giorgio Di Natale

Summary: Hardware Trojan Horses (HTHs) pose a serious threat to academia and industry due to their complexity and dangerousness. This paper proposes DETON, an automatic methodology for software manipulation to protect microprocessor-based systems against information stealing HTHs. DETON aims to produce an obfuscated version of the program to be executed on an untrusted CPU-based system, reducing the exposure of sensitive information to attackers. The DETON framework is compatible with the underlying target HW platform and incorporates guidelines and metrics for assessing software obfuscation against information-stealing HTHs.

JOURNAL OF SYSTEMS ARCHITECTURE (2022)

Article Engineering, Electrical & Electronic

Low power memristive gas sensor architectures with improved sensing accuracy

Saurabh Khandelwal, Marco Ottavi, Eugenio Martinelli, Abusaleh Jabir

Summary: Based on memristive devices, we propose a novel gas sensor architecture that can predictably reduce the impact of process and parametric variations on sensing accuracy, while significantly improving energy efficiency and power consumption. Additionally, this architecture offers advantages in terms of multifunctional logic operations and resource reusability.

JOURNAL OF COMPUTATIONAL ELECTRONICS (2022)

Article Computer Science, Hardware & Architecture

Design of Fault-Tolerant Distributed Cyber-Physical Systems for Smart Environments

Luca Cassano, Antonio Miele, Francesco Mione, Nicola Tonellotto, Carlo Vallati

Summary: This article proposes a novel system-level design approach for cyber-physical systems, considering the placement of processing, sensing, and actuation, as well as incorporating fault-tolerance mechanisms. Experimental results show that the approach reduces solution costs and ensures resource requirements and fault tolerance.

IEEE EMBEDDED SYSTEMS LETTERS (2022)

Article Computer Science, Hardware & Architecture

Processor Security: Detecting Microarchitectural Attacks via Count-Min Sketches

Kerem Arikan, Alessandro Palumbo, Luca Cassano, Pedro Reviriego, Salvatore Pontarelli, Giuseppe Bianchi, Oguz Ergin, Marco Ottavi

Summary: The article presents a new approach based on count-min sketches for detecting microarchitectural attacks on microprocessors featured by embedded systems. The method is effective in detecting various attacks without introducing interference to the system.

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS (2022)

Article Computer Science, Hardware & Architecture

Optimizing Learned Bloom Filters: How Much Should Be Learned?

Zhenwei Dai, Anshumali Shrivastava, Pedro Reviriego, Jose Alberto Hernandez

Summary: The learned Bloom filter (LBF) improves the false positive rate (FPR) for a given memory budget by combining a machine learning model with a traditional Bloom filter. By treating the machine learning model as a variable and selecting the one with the lowest FPR, this approach achieves better performance compared to existing designs.

IEEE EMBEDDED SYSTEMS LETTERS (2022)

Article Engineering, Electrical & Electronic

Evaluation of Dynamic Triple Modular Redundancy in an Interleaved-Multi-Threading RISC-V Core

Marcello Barbirotta, Abdallah Cheikh, Antonio Mastrandrea, Francesco Menichelli, Marco Ottavi, Mauro Olivieri

Summary: Functional safety is crucial in many applications involving microprocessors. Redundancy techniques like DMR and TMR are used to protect circuits against SEU faults. RISC-V is interesting for its extendability and open-source microarchitecture designs. In this work, a novel approach using IMT microprocessor architecture is presented, allowing for dynamic switching between DMR and TMR. Extensive RTL fault-injection simulations proved the effectiveness of this approach for a specific RISC-V core family.

JOURNAL OF LOW POWER ELECTRONICS AND APPLICATIONS (2023)

Article Engineering, Electrical & Electronic

Toward end-to-end latency management of 5G network slicing and fronthaul traffic (Invited paper)

David Larrabeiti, Luis M. Contreras, Gabriel Otero, Jose Alberto Hernandez, Juan P. Fernandez-Palacios

Summary: 5G network slicing allows operators to deploy virtual connectivity services tailored for specific purposes on top of the same underlying physical infrastructure. For some 5G services, real-time information of the end-to-end Quality of Service for a particular slice is needed. This paper discusses the challenges of achieving this, presents monitoring techniques based on common open interfaces, and provides practical rules for planning end-to-end latency for slices. It also reviews latency engineering approaches for fronthaul traffic.

OPTICAL FIBER TECHNOLOGY (2023)

Article Computer Science, Hardware & Architecture

Network traffic analysis under emerging beyond-5G scenarios for multi-band optical technology adoption

Marc Ruiz, Jose Alberto Hernandez, Marco Quagliotti, Emilio Hugues Salas, Emilio Riccardi, Albert Rafel, Luis Velasco, Oscar Gonzalez de Dios

Summary: The ITU-T Focus Group Network 2030 is assisting network operators in identifying network requirements for the short, medium, and long term. A traffic analysis methodology is introduced to estimate the expected traffic demand. Multi-band optical networks are expected to be implemented to meet the large bandwidth requirements.

JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING (2023)

Proceedings Paper Engineering, Electrical & Electronic

Latency-aware network architectures for 5G backhaul and fronthaul

D. Larrabeiti, G. Otero, J. P. Fernandez-Palacios, L. M. Contreras, J. A. Hernandez

Summary: 5G presents significant challenges in latency management, particularly in fronthaul and backhaul traffic transport. Operators are seeking a unified architecture that incorporates virtualization, programmability, and performance control.

2022 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXHIBITION (OFC) (2022)

Article Computer Science, Information Systems

Runtime Resource Management and Provisioning Middleware for Fog Computing Infrastructures

Antonio Miele, Henry Zarate, Luca Cassano, Cristiana Bolchini, Jorge E. Ortiz

Summary: This article proposes a runtime resource management and provisioning middleware for the dynamic distribution of applications on processing resources in the Fog Computing paradigm. The proposed middleware consists of a two-level hierarchy: a global Fog Orchestrator monitoring the architecture status, and a Local Agent on each node performing fine-grain tuning of its resources. The co-operation between these components allows dynamic adaptation and exploitation of fine-grain nodes view for fulfilling system-level goals.

ACM TRANSACTIONS ON INTERNET OF THINGS (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Yield Evaluation of Faulty Memristive Crossbar Array-based Neural Networks with Repairability

Anu Bala, Saurabh Khandelwal, Abusaleh Jabir, Marco Ottavi

Summary: This paper evaluates the yield of a memristor-based crossbar array of artificial neural networks in the presence of stuck-at-faults (SAFs). A technique based on Markov chains is used to estimate the yield in the presence of stuck-at-faults. The Poisson distribution is also used for analysis and comparison, considering all repairable fault patterns. The results show that yield can be improved with redundancies and a higher repairable stuck-at-fault ratio.

2022 IEEE 28TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2022) (2022)

Proceedings Paper Computer Science, Hardware & Architecture

ERIC: An Efficient and Practical Software Obfuscation Framework

Alperen Bolat, Seyyid Hikmet Celik, Ataberk Olgun, Oguz Ergin, Marco Ottavi

Summary: This article introduces the software obfuscation framework ERIC, which uses physical unclonable functions and unique device identifiers as secret keys to encrypt software executables, protecting software security by preventing static and dynamic analysis.

2022 52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2022) (2022)

No Data Available