Machine Learning for Hardware Security: Opportunities and Risks

被引:50
|
作者
Elnaggar, Rana [1 ]
Chakrabarty, Krishnendu [1 ]
机构
[1] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27705 USA
来源
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS | 2018年 / 34卷 / 02期
关键词
Hardware security; Machine learning; Hardware trojans; IC counterfeiting; Side-channel attack; IC overbuilding; Reverse engineering; TROJAN DETECTION; CLASSIFICATION; FRAMEWORK; CIRCUITS; ATTACKS;
D O I
10.1007/s10836-018-5726-9
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, machine learning algorithms have been utilized by system defenders and attackers to secure and attack hardware, respectively. In this work, we investigate the impact of machine learning on hardware security. We explore the defense and attack mechanisms for hardware that are based on machine learning. Moreover, we identify suitable machine learning algorithms for each category of hardware security problems. Finally, we highlight some important aspects related to the application of machine learning to hardware security problems and show how the practice of applying machine learning to hardware security problems has changed over the past decade.
引用
收藏
页码:183 / 201
页数:19
相关论文
共 50 条
  • [1] Machine Learning for Hardware Security: Opportunities and Risks
    Rana Elnaggar
    Krishnendu Chakrabarty
    Journal of Electronic Testing, 2018, 34 : 183 - 201
  • [2] Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk
    Regazzoni, Francesco
    Bhasin, Shivam
    Pour, Amir Ali
    Alshaer, Ihab
    Aydin, Furkan
    Aysu, Aydin
    Beroulle, Vincent
    Di Natale, Giorgio
    Franzon, Paul
    Hely, David
    Homma, Naofumi
    Ito, Akira
    Jap, Dirmanto
    Kashyap, Priyank
    Polian, Ilia
    Potluri, Seetal
    Ueno, Rei
    Vatajelu, Elena-Ioana
    Yli-Mayry, Ville
    2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD), 2020,
  • [3] Hardware for Machine Learning: Challenges and Opportunities
    Sze, Vivienne
    Then, Yu-Hsin
    Emer, Joel
    Suleiman, Amr
    Zhang, Zhengdong
    2018 IEEE CUSTOM INTEGRATED CIRCUITS CONFERENCE (CICC), 2018,
  • [4] Applications of Machine Learning in Hardware Security
    Halak, Basel
    Mispan, Mohd Syafiq
    2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022), 2022, : 212 - 213
  • [5] A Survey on Machine Learning in Hardware Security
    Koylu, Troya Cagil
    Reinbrecht, Cezar Rodolfo Wedig
    Gebregiorgis, Anteneh
    Hamdioui, Said
    Taouil, Mottaqiallah
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2023, 19 (02)
  • [6] Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges
    Patnaik, Satwik
    Gohil, Vasudev
    Guo, Hao
    Rajendran, Jeyavijayan
    2022 19TH INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2022, : 217 - 218
  • [7] Hardware for Machine Learning: Challenges and Opportunities (Invited Paper)
    Sze, Vivienne
    Chen, Yu-Hsin
    Emer, Joel
    Suleiman, Amr
    Zhang, Zhengdong
    2017 IEEE CUSTOM INTEGRATED CIRCUITS CONFERENCE (CICC), 2017,
  • [8] The Top 10 Risks of Machine Learning Security
    McGraw, Gary
    Bonett, Richie
    Shepardson, Victor
    Figueroa, Harold
    COMPUTER, 2020, 53 (06) : 57 - 61
  • [9] Hands-On Teaching of Hardware Security for Machine Learning
    Calhoun, Ashley
    Ortega, Erick
    Yaman, Ferhat
    Dubey, Anuj
    Aysu, Aydin
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 455 - 461
  • [10] Machine Learning Pipelines: Training, Deployment and Opportunities for Reconfigurable Hardware
    Becker, Jurgen
    Prasanna, Viktor K.
    2018 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW 2018), 2018, : 81 - 81