skip to main content
10.1145/3400302.3415710acmconferencesArticle/Chapter ViewAbstractPublication PagesiccadConference Proceedingsconference-collections
research-article
Public Access

Test generation using reinforcement learning for delay-based side-channel analysis

Published:17 December 2020Publication History

ABSTRACT

Reliability and trustworthiness are dominant factors in designing System-on-Chips (SoCs) for a variety of applications. Malicious implants, such as hardware Trojans, can lead to undesired information leakage or system malfunction. To ensure trustworthy computing, it is critical to develop efficient Trojan detection techniques. While existing delay-based side-channel analysis is promising, it is not effective due to two fundamental limitations: (i) The difference in path delay between the golden design and Trojan inserted design is negligible compared with environmental noise and process variations. (ii) Existing approaches rely on manually crafted rules for test generation, and require a large number of simulations, making it impractical for industrial designs. In this paper, we propose a novel test generation method using reinforcement learning for delay-based Trojan detection. This paper makes three important contributions.

1) Unlike existing methods that rely on the delay difference of a few gates, our proposed approach utilizes critical path analysis to generate test vectors that can maximize the side-channel sensitivity.

2) To the best of our knowledge, our approach is the first attempt in applying reinforcement learning for efficient test generation to detect Trojans using delay-based analysis. 3) Our experimental results demonstrate that our method can significantly improve both side-channel sensitivity (59% on average) and test generation time (17x on average) compared to state-of-the-art test generation techniques.

References

  1. [n. d.]. ISCAS89 Sequential Benchmark Circuits. https://filebox.ece.vt.edu/~mhsiao/iscas89.html.Google ScholarGoogle Scholar
  2. Alif Ahmed, Farimah Farahmandi, Yousef Iskander, and Prabhat Mishra. 2018. Scalable Hardware Trojan Activation by Interleaving Concrete Simulation and Symbolic Execution. In IEEE International Test Conference, ITC 2018. 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bharathan Balaji, et al. 2012. Accurate Characterization of the Variability in Power Consumption in Modern Mobile Processors. In Workshop on Power-Aware Computing and Systems.Google ScholarGoogle Scholar
  4. Rajat Subhra Chakraborty et al. 2009. MERO: A Statistical Approach for Hardware Trojan Detection. In Cryptographic Hardware and Embedded Systems. 396--410.Google ScholarGoogle Scholar
  5. Mingsong Chen and Prabhat Mishra. 2010. Functional Test Generation Using Efficient Property Clustering and Learning Techniques. IEEE Trans. on CAD of Integrated Circuits and Systems 29, 3 (2010), 396--404.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H, Choo et al. 2020. Register-Transfer-Level Features for Machine-Learning-Based Hardware Trojan Detection. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A. 2 (2020), 502--509.Google ScholarGoogle Scholar
  7. Jonathan Cruz, Farimah Farahmandi, Alif Ahmed, and Prabhat Mishra. 2018. Hardware Trojan Detection Using ATPG and Model Checking. In International Conference on VLSI Design. 91--96.Google ScholarGoogle Scholar
  8. Jonathan Cruz, Yuanwen Huang, Prabhat Mishra, and Swarup Bhunia. 2018. An automated configurable Trojan insertion framework for dynamic trust benchmarks. In Design, Automation & Test in Europe Conference (DATE). 1598--1603.Google ScholarGoogle Scholar
  9. Leonardo Mendonça de Moura and Nikolaj Bjørner. 2008. Z3: An Efficient SMT Solver. In Tools and Algorithms for the Construction and Analysis of Systems, 14th International Conference, TACAS. 337--340.Google ScholarGoogle Scholar
  10. Rana Elnaggar and Krishnendu Chakrabarty. 2018. Machine Learning for Hardware Security: Opportunities and Risks. J. Electronic Testing 34, 2 (2018), 183--201.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Farimah Farahmandi, Yuanwen Huang, and Prabhat Mishra. 2017. Trojan localization using symbolic algebra. In 22nd Asia and South Pacific Design Automation Conference (ASP-DAC). 591--597.Google ScholarGoogle ScholarCross RefCross Ref
  12. Farimah Farahmandi and Prabhat Mishra. 2019. Automated Test Generation for Debugging Multiple Bugs in Arithmetic Circuits. IEEE Trans. Computers 68, 2 (2019), 182--197.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Anna Goldie and Azalia Mirhoseini. 2020. Placement Optimization with Deep Reinforcement Learning. CoRR abs/2003.08445 (2020).Google ScholarGoogle Scholar
  14. Yi Han, Sriharsha Etigowni, Hua Liu, Saman A. Zonouz, and Athina P. Petropulu. 2017. Watch Me, but Don't Touch Mel Contactless Control Flow Monitoring via Electromagnetic Emanations. In Proceedings of the 2017 ACM. 1095--1108.Google ScholarGoogle Scholar
  15. Yuanwen Huang, Swarup Bhunia, and Prabhat Mishra. 2016. MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection. In ACM SIGSAC Conference on Computer and Communications Security. 130--141.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Yuanwen Huang, Swarup Bhunia, and Prabhat Mishra. 2018. Scalable Test Generation for Trojan Detection Using Side Channel Analysis. IEEE Trans. Information Forensics and Security 13, 11 (2018), 2746--2760.Google ScholarGoogle ScholarCross RefCross Ref
  17. Sami Khairy, Ruslan Shaydulin, Lukasz Cincio, Yuri Alexeev, and Prasanna Balaprakash. 2019. Reinforcement-Learning-Based Variational Quantum Circuits Optimization for Combinatorial Problems. CoRR abs/1911.04574 (2019).Google ScholarGoogle Scholar
  18. Yangdi Lyu and Prabhat Mishra. 2018. A Survey of Side-Channel Attacks on Caches and Countermeasures. J. Hardware and Systems Security 2, 1 (2018), 33--50.Google ScholarGoogle ScholarCross RefCross Ref
  19. Yangdi Lyu and Prabhat Mishra. 2019. Efficient Test Generation for Trojan Detection using Side Channel Analysis. In Design, Automation & Test in Europe Conference (DATE). 408--413.Google ScholarGoogle Scholar
  20. Yangdi Lyu and Prabhat Mishra. 2020. Automated Test Generation for Trojan Detection using Delay-based Side Channel Analysis. In Design, Automation & Test in Europe Conference (DATE).Google ScholarGoogle Scholar
  21. M. Pecht and S. Tiku. 2006. Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronics, IEEE Spectrum 43, 5 (2006), 37--46.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Devendra Rai and John Lach. 2009. Performance of Delay-Based Trojan Detection Techniques under Parameter Variations. In IEEE International Workshop on Hardware-Oriented Security and Trust, HOST. 58--65.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Mohammad Tehranipoor and Farinaz Koushanfar. 2010. A Survey of Hardware Trojan Taxonomy and Detection. IEEE Des. Test Comput. 27, 1 (2010), 10--25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. John Villasenor and Mark Tehranipoor. 2013. Chop shop electronics. Spectrum, IEEE 50 (10 2013), 41--45. Google ScholarGoogle ScholarCross RefCross Ref
  25. Ronald J. Williams. 1992. Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning. Mach. Learn. 8 (1992), 229--256.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Chunyi Wu et al. 2019. Explore Deep Neural Network and Reinforcement Learning to Large-scale Tasks Processing in Big Data. Int. J. Pattern Recognit Artif. Intell. 33, 13 (2019), 1951010:1--1951010:29.Google ScholarGoogle Scholar

Index Terms

  1. Test generation using reinforcement learning for delay-based side-channel analysis

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ICCAD '20: Proceedings of the 39th International Conference on Computer-Aided Design
      November 2020
      1396 pages
      ISBN:9781450380263
      DOI:10.1145/3400302
      • General Chair:
      • Yuan Xie

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 December 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate457of1,762submissions,26%

      Upcoming Conference

      ICCAD '24
      IEEE/ACM International Conference on Computer-Aided Design
      October 27 - 31, 2024
      New York , NY , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader