Applications of Machine Learning in Hardware Security

被引:0
作者
Halak, Basel [1 ]
Mispan, Mohd Syafiq [2 ]
机构
[1] Univ Southampton, Sch Elect & Comp Sci, Southampton SO17 1BJ, Hants, England
[2] Univ Teknikal Malaysia Melaka, Fak Teknol Kejuruteraan Elekt & Elekt, Melaka, Malaysia
来源
2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022) | 2022年
关键词
Machine Learning; Hardware Security; Detection; IC counterfeit; Hardware Trojan; Training Data; Adversarial Attacks;
D O I
10.1109/SMARTTECH54121.2022.00053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
this study explores the uses of machine learning (ML) in the field of hardware security, in particular, two applications areas are considered, namely, hardware Trojan (HT) and IC counterfeits. These examples demonstrate how ML algorithm can be employed as a defense mechanism to detect forged or tampered-with circuits. Our analysis shows that the ML detect' accuracy still has not reached 100%. The selection and size of the feature vectors greatly affect the performance of the learning models, however, increasing the number of features or their size can lead to large overheads. Therefore, a thorough analysis is required to only select the appropriate- ate several relevant features that significantly contribute to the accuracy of ML models. The study also highlighted the need for a more robust deployment of ML algorithm to enhance its resilience to adversarial attacks.
引用
收藏
页码:212 / 213
页数:2
相关论文
共 10 条
[1]   Automated detection of counterfeit ICs using machine learning [J].
Ahmadi, Bahar ;
Javidi, Bahram ;
Shahbazmohamadi, Sina .
MICROELECTRONICS RELIABILITY, 2018, 88-90 :371-377
[2]   Recycled FPGA Detection Using Exhaustive LUT Path Delay Characterization and Voltage Scaling [J].
Alam, Md Mahbub ;
Tehranipoor, Mark ;
Forte, Domenic .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (12) :2897-2910
[3]  
[Anonymous], 2011, P 4 ACM WORKSHOP SEC, DOI DOI 10.1145/2046684.2046692
[4]  
Aramoon O, 2020, INT SYM QUAL ELECT, P352, DOI [10.1109/isqed48828.2020.9136972, 10.1109/ISQED48828.2020.9136972]
[5]   Machine Learning Assisted Accurate Estimation of Usage Duration and Manufacturer for Recycled and Counterfeit Flash Memory Detection [J].
Chattopadhyay, Saranyu ;
Kumari, Preeti ;
Ray, Biswajit ;
Chakraborty, Rajat Subhra .
2019 IEEE 28TH ASIAN TEST SYMPOSIUM (ATS), 2019, :49-54
[6]  
Duan S., 2021, Emerging Topics in Hardware Security, P111
[7]   Machine Learning for Hardware Security: Opportunities and Risks [J].
Elnaggar, Rana ;
Chakrabarty, Krishnendu .
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2018, 34 (02) :183-201
[8]   Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead [J].
Guin, Ujjwal ;
DiMase, Daniel ;
Tehranipoor, Mohammad .
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2014, 30 (01) :9-23
[9]  
Hasegawa K, 2016, IEEE INT ON LINE, P203, DOI 10.1109/IOLTS.2016.7604700
[10]  
Kulkarni A, 2016, PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P120, DOI 10.1109/HST.2016.7495568