Guided Data Augmentation Scheme Combined with Adaptive Evolutionary Algorithm for Hardware Trojan Detection to Enhance Communication Security
(*) Corresponding author
The security of the RS232 module plays a pivotal role in ensuring secure communication. Hardware Trojans can be used to gain root shell access to the RS232 modules to leak sensitive information or perform other malicious actions. As a result, it is crucial to detect the presence of hardware Trojans effectively. The work proposes a guided data augmentation scheme that facilitates enhanced synthetic data generation without any false positives. The proposed scheme uses instance hardness based under sampling to effectively remove data with less information and ADASYN upsampling algorithm to produce more realistic synthetic data. The work thus effectively utilizes the information present in majority and minority data instances effectively. In order to facilitate accurate Trojan detection, hyperparameters of the XGBoost model are optimized using genetic algorithm. The model produces zeros false positives and false negatives for all the test circuits.
Copyright © 2022 Praise Worthy Prize - All rights reserved.
Mohammed, H., Hasan, S.R. and Awwad, F., Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks. IEEE Access, Volume. 8,2020, pp.36847-36862.
Gül, Ö., A Research on Cyber Security Intrusion Detection Against Physical Access Cyber Attacks Using Open Source Software for Smart Grids, (2021) International Review of Electrical Engineering (IREE), 16 (2), pp. 136-146.
Seethal, C., Yamuna, B., Balasubramanian, K., Mishra, D., Nagaraj, N., Turbo Product Codes for Satellite Communication: a Survey, (2022) International Journal on Communications Antenna and Propagation (IRECAP), 12 (2), pp. 98-110.
H. Li, Q. Liu, and J. Zhang, A survey of hardware trojan threat and defense, Integration, Volume. 55, 2016. pp. 426-437.
Srinivas, C.G., Balachander, S., Singh Samant, Y.C., Hariharan, B.V. and Devi, M.N., Hardware Trojan Detection Using XGBoost Algorithm for IoT with Data Augmentation Using CTGAN and SMOTE. International Conference on Ubiquitous Communications and Network Computing, pp. 116-127. Springer, Cham. March 2021
Priyatharishini, M., and M. Nirmala Devi. A compressive sensing algorithm for hardware trojan detection. International Journal of Electrical and Computer Engineering Volume. 9, 2019, pp: 4035-4043.
Dong C, He G, Liu X, Yang Y, Guo W. A multi-layer hardware trojan protection framework for IoT chips, IEEE Access, February 2019 pp.23628-39.
K. Hasegawa, M. Oya, M. Yanagisawa, and N. Togawa, Hardware trojans classification for gate-level netlists based on machine learning, IEEE 22nd International Symposium On-Line Testing and Robust System Design (IOLTS), 2016, pp. 203-206.
Hasegawa K, Yanagisawa M and Togawa N. Trojan-net feature extraction and its application to hardware-Trojan detection for gate-level netlists using random forest. IEICE T Fund Electr, 2017, Volume 100, pp2857-2868.
Hasegawa K, Yanagisawa M and Togawa N. Hardware Trojans classification for gate-level netlists using multilayer neural networks. IEEE23rd international symposium on on-line testing and robust system design (IOLTS), Thessaloniki, 3-5,pp.227-232. New York, July 2017
Dong, Chen, Jinghui Chen, Wenzhong Guo, and Jian Zou. A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things. International Journal of Distributed Sensor Networks 15, no. 12 (2019): 1550147719888098.
C. H. Kok, C. Y. Ooi, M. Moghbel, N. Ismail, H. S. Choo, and M. Inoue, Classification of trojan nets based on scoap values using supervised learning, IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-5,2019.
Sharma, R., Valivati, N.K., Sharma, G.K. and Pattanaik, M., 2020, July. A New Hardware Trojan Detection Technique using Class Weighted XGBoost Classifier. 24th International Symposium on VLSI Design and Test (VDAT) (pp. 1-6),2020.
Priyadharshini M, Saravanan P, An Efficient Hardware Trojan Detection Approach adopting Testability based Features in Proc. IEEE Int. TestConf., pp. 1-5, Jul. 2020.
Naskar, P., Dhar, T., Roy, S. K.,Hardware Trojan Detection Using Improved Testability Measures, IEEE Int, Symp. on Devices, Circuits and Systems (ISDCS), pp. 1-6, Mar. 2020.
Hasegawa, K., Yanagisawa, M. and Togawa, N.,A hardware-Trojan classification method utilizing boundary net structures, IEEE Int. Conf. on Consumer Electron. (ICCE), pp. 1-4, Jan. 2018.
Li, S., Zhang, Y., Chen, X., Ge, M., Mao, Z. and Yao, J. A XGBoost based Hybrid Detection Scheme for Gate-Level Hardware Trojan, IEEE 9th Joint Int. Inf. Technol. and Artificial Intelligence Conf. (ITAIC, pp. 41-47), Dec. 2020.
Zhang, Y., Li, S., Chen, X., Yao, J., Mao, Z., Yang, J. and Hua, Y.,Hybrid multi-level hardware Trojan detection platform for gate-level netlists based on XGBoost, IET Comput. & Digital Techniques, vol. 16, no.(2-3), May.2022, pp.54-70.
Zhang, N., Lv, Z., Zhang, Y., Li, H., Zhang, Y. and Huang, W., Novel design of Hardware Trojan: A generic approach for defeating testability based detection. IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 162-173, December 2020.
Simulator, Synopsys. Design Compiler Reference Manual. (1994).
Chen, T. and Guestrin, C. (2016) XGBoost: a scalable tree boosting system, Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, New York, USA, pp.785-794, 2016.
Sriram, S., Vinayakumar, R., Alazab, M. and Soman, K.P., 2020, July. Network flow based IoT botnet attack detection using deep learning. IEEE INFOCOM IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) pp. 189-194, 2020.
Sriram, S., Vinayakumar, R., Sowmya, V., Krichen, M., Noureddine, D.B., Shashank, A. and Soman, K.P., Deep convolutional neural networks for image spam classification,2020
Yu, W., Na, Z., Fengxia, Y. and Yanping, G., Magnetic resonance imaging study of gray matter in schizophrenia based on XGBoost. Journal of Integrative Neuroscience, 2018, Volume 17, pp.331-336.
Smith, M.R.; Martinez, T.R.; Giraud-Carrier, C.G. An instance level analysis of data complexity. Mach. Learn. 2014, 95, 225-256.
He, H., Bai, Y., Garcia, E. A. and Li, S. (2008) Adasyn: Adaptive synthetic sampling approach for imbalanced learning, 2008 IEEE international joint conference on neural networks (IEEE world congress on computational intelligence), IEEE, pp. 1322-1328.
J. Kennedy and R. Eberhart, Particle swarm optimization, in Proc. IEEE ICNN Int. Conf. Neural Netw., vol. 4, Nov./Dec. 1995, pp. 1942-1948.
N. Metropolis, A. W. Rosenbluth, M. N. Rosenbluth, A. H. Teller, and E. Teller, Equation of state calculations by fast computing machines, J. Chem. Phys., vol. 21, no. 6, pp. 1087-1092, Jun. 1953.
M. Dorigo, M. Birattari, and T. Stutzle, Ant colony optimization, IEEE Comput. Intell. Mag., vol. 1, no. 4, pp. 28-39, Nov. 2006.
Mirjalili, S., 2019. Genetic algorithm. In Evolutionary algorithms and neural networks (pp. 43-55). Springer, Cham.
Chen, J., Zhao, F., Sun, Y. and Yin, Y., 2020. Improved XGBoost model based on genetic algorithm. International Journal of Computer Applications in Technology, 62(3), pp.240-245.
H. Salmani, M. Tehranipoor, and R. Karri, On design vulnerability analysis and trust benchmarks development, in 2013 IEEE 31st international conference on computer design (ICCD). IEEE, 2013, pp.471-474.
S.-l. D. Scikit, Scikit-learn: Machine learning in python, Journal of Machine Learning Research, vol. 12, pp. 2825-2830, 2011.
Bani Younes, A., Batayneh, W., Khamis, A., Cooperative Aerial-Ground Robotic System Using Genetic Algorithm Auto-Tuned Fractional Order PID Control, (2021) International Review of Automatic Control (IREACO), 14 (6), pp. 348-359.
Jaber, A., Mohammed, K., Shalash, N., Optimization of Electrical Power Systems Using Hybrid PSO-GA Computational Algorithm: a Review, (2020) International Review of Electrical Engineering (IREE), 15 (6), pp. 502-511.
- There are currently no refbacks.
Please send any question about this web site to firstname.lastname@example.org
Copyright © 2005-2023 Praise Worthy Prize