A Neural Network Trojan Detection Method Based on Particle Swarm Optimization
Title | A Neural Network Trojan Detection Method Based on Particle Swarm Optimization |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Wang, C., Zhao, S., Wang, X., Luo, M., Yang, M. |
Conference Name | 2018 14th IEEE International Conference on Solid-State and Integrated Circuit Technology (ICSICT) |
Date Published | Nov. 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-4441-6 |
Keywords | Artificial neural networks, cryptography, Hardware, hardware Trojan detection, HSPICE power consumption simulation, Integrated circuit modeling, intelligent neural networks algorithm, invasive software, malicious modifications, neural nets, neural network Trojan detection, particle swarm optimisation, particle swarm optimization, power aware computing, power consumption, power consumption data, Power demand, principal component analysis, Principal Component Analysis algorithm, PSO NN method, pubcrawl, RTL circuits, Side Channel Analysis technology, trojan horse detection, Trojan horses |
Abstract | Hardware Trojans (HTs) are malicious modifications of the original circuits intended to leak information or cause malfunction. Based on the Side Channel Analysis (SCA) technology, a set of hardware Trojan detection platform is designed for RTL circuits on the basis of HSPICE power consumption simulation. Principal Component Analysis (PCA) algorithm is used to reduce the dimension of power consumption data. An intelligent neural networks (NN) algorithm based on Particle Swarm Optimization (PSO) is introduced to achieve HTs recognition. Experimental results show that the detection accuracy of PSO NN method is much better than traditional BP NN method. |
URL | https://ieeexplore.ieee.org/document/8564880 |
DOI | 10.1109/ICSICT.2018.8564880 |
Citation Key | wang_neural_2018 |
- particle swarm optimization
- Trojan horses
- trojan horse detection
- Side Channel Analysis technology
- RTL circuits
- pubcrawl
- PSO NN method
- Principal Component Analysis algorithm
- principal component analysis
- Power demand
- power consumption data
- power consumption
- power aware computing
- Artificial Neural Networks
- particle swarm optimisation
- neural network Trojan detection
- neural nets
- malicious modifications
- invasive software
- intelligent neural networks algorithm
- Integrated circuit modeling
- HSPICE power consumption simulation
- hardware Trojan detection
- Hardware
- Cryptography