ABSTRACT
Due to globalized semiconductor supply chain, there is an increasing risk of exposing System-on-Chip (SoC) designs to malicious implants, popularly known as hardware Trojans. Unfortunately, traditional simulation-based validation using millions of test vectors is unsuitable for detecting stealthy Trojans with extremely rare trigger conditions due to exponential input space complexity of modern SoCs. There is a critical need to develop efficient Trojan detection techniques to ensure trustworthy SoCs. While there are promising test generation approaches, they have serious limitations in terms of scalability and detection accuracy. In this paper, we propose a novel logic testing approach for Trojan detection using an effective combination of testability analysis and reinforcement learning. Specifically, this paper makes three important contributions. 1) Unlike existing approaches, we utilize both controllability and observability analysis along with rareness of signals to significantly improve the trigger coverage. 2) Utilization of reinforcement learning considerably reduces the test generation time without sacrificing the test quality. 3) Experimental results demonstrate that our approach can drastically improve both trigger coverage (14.5% on average) and test generation time (6.5 times on average) compared to state-of-the-art techniques.
- [n.d.]. ISCAS Benchmarks. https://filebox.ece.vt.edu/~mhsiao/iscas89.html.Google Scholar
- [n.d.]. SCOAP. https://sourceforge.net/projects/testabilitymeasurementtool/.Google Scholar
- Alif Ahmed et al. 2018. Scalable hardware Trojan activation by interleaving concrete simulation and symbolic execution. In International Test Conference. 1--10.Google Scholar
- Thomas Back. 1996. Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms. Oxford university press.Google Scholar
- R. Chakraborty et al. 2009. MERO: A Statistical Approach for Hardware Trojan Detection. In CHES. 396--410.Google Scholar
- Yuanwen Huang et al. 2018. Scalable test generation for Trojan detection using side channel analysis. IEEE TIFS 13, 11 (2018), 2746--2760.Google Scholar
- Henry J Kelley. 1960. Gradient theory of optimal flight paths. Ars Journal 30, 10 (1960), 947--954.Google ScholarCross Ref
- Sami Khairy et al. 2019. Reinforcement-Learning-Based Variational Quantum Circuits Optimization for Combinatorial Problems. CoRR abs/1911.04574 (2019).Google Scholar
- Yangdi Lyu and Prabhat Mishra. 2020. Automated Trigger Activation by Repeated Maximal Clique Sampling. In ASPDAC. 482--487.Google Scholar
- Yangdi Lyu and Prabhat Mishra. 2020. MaxSense: Side-Channel Sensitivity Maximization for Trojan Detection using Statistical Test Patterns. TODAES (2020).Google Scholar
- Yangdi Lyu and Prabhat Mishra. 2020. Scalable Activation of Rare Triggers in Hardware Trojans by Repeated Maximal Clique Sampling. IEEE TCAD (2020).Google ScholarCross Ref
- L. Moura and N. Bjørner. 2008. Z3: An Efficient SMT Solver. In TACAS. 337--340.Google Scholar
- M. Nourian et al. 2018. Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing. JETTA 34, 4 (2018), 461--470.Google Scholar
- Zhixin Pan, Jennifer Sheldon, and Prabhat Mishra. 2020. Test Generation using Reinforcement Learning for Delay-based Side-Channel Analysis. ICCAD.Google Scholar
- Irith Pomeranz and Sudhakar M. Reddy. 2004. A Measure of Quality for n-Detection Test Sets. IEEE Trans. Computers 53, 11 (2004), 1497--1503.Google ScholarDigital Library
- Stuart J Russell and Peter Norvig. 2016. Artificial intelligence: a modern approach. Malaysia; Pearson Education Limited.Google ScholarDigital Library
- H. Salmani. 2017. COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist. TIFS (2017).Google Scholar
Recommendations
Multi-Objective Optimization Based Test Pattern Generation for Hardware Trojan Detection
AbstractHardware Trojan (HT) is a severe security threat during the development of an integrated circuit that can deviate the IC from its normal function and/or leak sensitive information during in-field operations. Trojans are often inserted during the ...
Web Bot Detection Evasion Using Deep Reinforcement Learning
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityWeb bots are vital for the web as they can be used to automate several actions, some of which would have otherwise been impossible or very time consuming. These actions can be benign, such as website testing and web indexing, or malicious, such as ...
Comments