Real-time ML-based Defense Against Malicious Payload in Reconfigurable Embedded Systems
By: Rye Stahle-Smith, Rasha Karakchi
Potential Business Impact:
Finds bad code hidden in computer chips.
The growing use of FPGAs in reconfigurable systems introducessecurity risks through malicious bitstreams that could cause denial-of-service (DoS), data leakage, or covert attacks. We investigated chip-level hardware malicious payload in embedded systems and proposed a supervised machine learning method to detect malicious bitstreams via static byte-level features. Our approach diverges from existing methods by analyzing bitstreams directly at the binary level, enabling real-time detection without requiring access to source code or netlists. Bitstreams were sourced from state-of-the-art (SOTA) benchmarks and re-engineered to target the Xilinx PYNQ-Z1 FPGA Development Board. Our dataset included 122 samples of benign and malicious configurations. The data were vectorized using byte frequency analysis, compressed using TSVD, and balanced using SMOTE to address class imbalance. The evaluated classifiers demonstrated that Random Forest achieved a macro F1-score of 0.97, underscoring the viability of real-time Trojan detection on resource-constrained systems. The final model was serialized and successfully deployed via PYNQ to enable integrated bitstream analysis.
Similar Papers
Hybrid Cryptographic Monitoring System for Side-Channel Attack Detection on PYNQ SoCs
Cryptography and Security
Protects secret codes from being broken by hackers.
A Hybrid Deep Learning and Anomaly Detection Framework for Real-Time Malicious URL Classification
Cryptography and Security
Stops bad websites from tricking you online.
Democratizing ML for Enterprise Security: A Self-Sustained Attack Detection Framework
Cryptography and Security
Finds computer threats with less work.