A CatBoost Based Approach to Detect Label Flipping Poisoning Attack in Hardware Trojan Detection Systems

被引:2
|
作者
Sharma, Richa [1 ]
Sharma, G. K. [1 ]
Pattanaik, Manisha [1 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior 474015, India
关键词
Hardware Trojan; Label Flipping Poisoning Attack; SCOAP features; Machine Learning; CatBoost; THREAT;
D O I
10.1007/s10836-022-06035-6
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Hardware Trojan (HT) intrusion at different integrated circuit (IC) phases is the most important concern for the semiconductor industries. Recently, machine learning (ML) models have been used to detect HT from the pre-silicon IC phase, which utilizes either structural or SCOAP gate level netlist features. However, the main concern is that an adversary may poison the training dataset by flipping the target labels to malign the ML model training, which further provides an incorrect prediction on the test dataset. Thus, due to the malicious training of ML models, the Trojan-inserted ICs are missed out and can easily perform their malicious activities. Hence, it is of utmost importance to scan the training dataset and identify the poisoned input samples before applying ML models for HT detection. Therefore, this paper proposes a new technique that first identifies the poisoned training samples, which consist of SCOAP features, and then detects HTs from the unseen gate-level netlist. The proposed technique employs a robust ensemble Categorical Boosting (CatBoost) model, which avoids the problem of target leakage by using the concept of ordered boosting. Further, a label flipping poisoning attack based on a stochastic hill climbing search is proposed, which flips the labels of the handful of samples that maximizes the validation dataset loss by deteriorating the model performance. Moreover, a defense method is proposed which utilizes CatBoost object importance and k-nearest neighbor to detect malicious training samples and restore their original labels. Finally, the CatBoost model is trained on the clean dataset to detect the HT nets from the unseen gate-level netlist accurately. Experimental results shows that the proposed attack method increases the on-an-average loss up to 58% and 54% on Trust-Hub and DeTrust benchmarks. Whereas the proposed defense method accurately identifies the poisoned input labels from the training dataset with on-an average 99% accuracy on these benchmarks.
引用
收藏
页码:667 / 682
页数:16
相关论文
共 50 条
  • [1] A CatBoost Based Approach to Detect Label Flipping Poisoning Attack in Hardware Trojan Detection Systems
    Richa Sharma
    G. K. Sharma
    Manisha Pattanaik
    Journal of Electronic Testing, 2022, 38 : 667 - 682
  • [2] Novel Label Flipping Dataset Poisoning Attack Against ML-based HT Detection Systems
    Sharma, Richa
    Sharma, G. K.
    Pattanaik, Manisha
    2023 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, APCCAS, 2024, : 80 - 84
  • [3] Transfer learning based countermeasure against label flipping poisoning attack
    Chan, Patrick P. K.
    Luo, Fengzhi
    Chen, Zitong
    Shu, Ying
    Yeung, Daniel S.
    INFORMATION SCIENCES, 2021, 548 : 450 - 460
  • [4] Data Poisoning Attack by Label Flipping on SplitFed Learning
    Gajbhiye, Saurabh
    Singh, Priyanka
    Gupta, Shaifu
    RECENT TRENDS IN IMAGE PROCESSING AND PATTERN RECOGNITION, RTIP2R 2022, 2023, 1704 : 391 - 405
  • [5] Adversarial Label Flipping Attack on Supervised Machine Learning-Based HT Detection Systems
    Sharma, Richa
    Sharma, G. K.
    Pattanaik, Manisha
    2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,
  • [6] Fault attack hardware Trojan detection method based on ring oscillator
    Bi, Qiangjia
    Wu, Ning
    Zhou, Fang
    Zhang, Jinbao
    Yahya, Muhammad Rehan
    Ge, Fen
    IEICE ELECTRONICS EXPRESS, 2019, 16 (08)
  • [7] Deep Learning Based Approach for Hardware Trojan Detection
    Amrita Vishwa Vidyapeetham, Center for Cybersecurity Systems and Networks, Amritapuri, India
    不详
    Proc. - IEEE Int. Symp. Smart Electron. Syst., iSES, 1600, (177-182): : 177 - 182
  • [8] Deep Learning Based Approach for Hardware Trojan Detection
    Sankaran, Sriram
    Mohan, Vamshi Sunku
    Purushothaman, A.
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2021), 2021, : 177 - 182
  • [9] Adversarial Attack Against Golden Reference-Free Hardware Trojan Detection Approach
    Ghimire, Ashutosh
    Alkurdi, Mohammed
    Gurung, Karma
    Amsaad, Fathi
    2024 IEEE Physical Assurance and Inspection of Electronics, PAINE 2024, 2024,
  • [10] A stealthy Hardware Trojan based on a Statistical Fault Attack
    Momin, Charles
    Bronchain, Olivier
    Standaert, Francois-Xavier
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2021, 13 (04): : 587 - 600