Trojan Forge: Generating Adversarial Hardware Trojan Examples Using Reinforcement Learning

被引:0
作者
Sarihi, Amin [1 ]
Jamieson, Peter [2 ]
Patooghy, Ahmad [3 ]
Badawy, Abdel-Hameed A. [1 ]
机构
[1] New Mexico State Univ, Las Cruces, NM 88003 USA
[2] Miami Univ, Oxford, OH USA
[3] North Carolina A&T State Univ, Greensboro, NC USA
来源
2024 ACM/IEEE 6TH SYMPOSIUM ON MACHINE LEARNING FOR CAD, MLCAD 2024 | 2024年
关键词
Hardware Trojan; Hardware Security; Reinforcement Learning; Adversarial Examples; INSERTION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Hardware Trojan (HT) problem can be thought of as a continuous game between attackers and defenders, each striving to outsmart the other by leveraging any available means for an advantage. Machine Learning (ML) has recently played a key role in advancing HT research. Various novel techniques, such as Reinforcement Learning (RL) and Graph Neural Networks (GNNs), have shown HT insertion and detection capabilities. HT insertion with ML techniques, specifically, has seen a spike in research activity due to the shortcomings of conventional HT benchmarks and the inherent human design bias that occurs when we create them. This work continues this innovation by presenting a tool called "TrojanForge", capable of generating HT adversarial examples that defeat HT detectors; demonstrating the capabilities of GAN-like adversarial tools for automatic HT insertion. We introduce an RL environment where the RL insertion agent interacts with HT detectors in an insertion-detection loop where the agent collects rewards based on its success in bypassing HT detectors. Our results show that this process helps inserted HTs evade various HI detectors, achieving high attack success percentages. This tool provides insight into why HT insertion fails in some instances and how we can leverage this knowledge in defense.
引用
收藏
页数:7
相关论文
共 25 条
[1]  
Bhunia S., 2018, HARDWARE TROJAN WAR, DOI [10.1007/978-3-319-68511-3, DOI 10.1007/978-3-319-68511-3]
[2]  
Cruz J, 2018, DES AUT TEST EUROPE, P1598, DOI 10.23919/DATE.2018.8342270
[3]  
eecs, ISCAS High-Level Models
[4]  
github, GitHub -TrojanForge-Adversarial-Hardware-Trojan-Examples: Hardware Trojan Benchmark-github.com
[5]  
Gohil V., 2022, Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, P1275, DOI [10.1145/3548606.3560690, DOI 10.1145/3548606.3560690]
[6]  
Gohil V, 2024, Arxiv, DOI arXiv:2402.13946
[7]   DETERRENT: Detecting Trojans using Reinforcement Learning [J].
Gohil, Vasudev ;
Patnaik, Satwik ;
Guo, Hao ;
Kalathil, Dileep ;
Rajendran, Jeyavijayan J. V. .
PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, 2022, :697-702
[8]  
Hagberg Aric A., 2008, Proceedings_of_the_7th_Python_in_Science_Conference, P11
[9]   R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training [J].
Hasegawa, Kento ;
Hidano, Seira ;
Nozawa, Kohei ;
Kiyomoto, Shinsaku ;
Togawa, Nozomu .
IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (02) :333-345
[10]   Reflections on Trusting TrustHUB [J].
Krieg, Christian .
2023 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2023,