Publication Date
2024
Document Type
Thesis
Committee Members
Fathi Amsaad, Ph.D. (Advisor); Kenneth Hopkinson, Ph.D. (Committee Member); Wen Zhang, Ph.D. (Committee Member)
Degree Name
Master of Science in Computer Engineering (MSCE)
Abstract
Hardware components are becoming prone to threats with increasing technological advances. Malicious modifications to such components are increasing and are known as hardware Trojans. Traditional approaches rely on functional assessments and are not sufficient to detect such malicious actions of Trojans. Machine learning (ML) assisted techniques play a vital role in the overall detection and improvement of Trojan. Our novel approach using various ML models brings an improvement in hardware Trojan identification with power signal side channel analysis. This study brings a paradigm shift in the improvement of Trojan detection in integrated circuits (ICs). In addition to this, our further analysis towards hardware authentication extends towards PUFs (Physical Unclonable Functions). Arbiter PUFs were chosen for this purpose. These are also Vulnerable towards ML attacks. Advanced ML assisted techniques predict the responses and perform attacks which leads to the integrity of PUFs. Our study helps improve ML-assisted hardware authentication for ML attacks. In addition, our study also focused on the defense part with the addition of noise and applying the same attack ML-assisted model. Detection of Trojan in hardware components is achieved by implementing machine learning techniques. For this Purpose, several Machine learning models were chosen. Among them, Random Forest classifier (RFC) and Deep neural network shows the highest accuracy. This analysis plays a vital role in the security aspect of all hardware components and sets a benchmark for the overall security aspects of hardware. Feature extraction process plays major role for the improvement of accuracy and reliability of hardware Trojan classification. Overall, this study brings significant improvement in the field of overall hardware security. Our study shows that RFC performs best in hardware classification with an average of 98. 33% precision of all chips, and deep learning techniques give 93. 16% precision of all chips. Moreover, on the hardware authentication side, RFC performs the best of all other models with the accuracy of 89% in the attack part and 81% in the defense part in 6000 data samples.
Page Count
122
Department or Program
Department of Computer Science and Engineering
Year Degree Awarded
2024
Copyright
Copyright 2024, all rights reserved. My ETD will be available under the "Fair Use" terms of copyright law.
ORCID ID
0000-0002-3904-3169