ABSTRACT
Reliability and trustworthiness are dominant factors in designing System-on-Chips (SoCs) for a variety of applications. Malicious implants, such as hardware Trojans, can lead to undesired information leakage or system malfunction. To ensure trustworthy computing, it is critical to develop efficient Trojan detection techniques. While existing delay-based side-channel analysis is promising, it is not effective due to two fundamental limitations: (i) The difference in path delay between the golden design and Trojan inserted design is negligible compared with environmental noise and process variations. (ii) Existing approaches rely on manually crafted rules for test generation, and require a large number of simulations, making it impractical for industrial designs. In this paper, we propose a novel test generation method using reinforcement learning for delay-based Trojan detection. This paper makes three important contributions.
1) Unlike existing methods that rely on the delay difference of a few gates, our proposed approach utilizes critical path analysis to generate test vectors that can maximize the side-channel sensitivity.
2) To the best of our knowledge, our approach is the first attempt in applying reinforcement learning for efficient test generation to detect Trojans using delay-based analysis. 3) Our experimental results demonstrate that our method can significantly improve both side-channel sensitivity (59% on average) and test generation time (17x on average) compared to state-of-the-art test generation techniques.
- [n. d.]. ISCAS89 Sequential Benchmark Circuits. https://filebox.ece.vt.edu/~mhsiao/iscas89.html.Google Scholar
- Alif Ahmed, Farimah Farahmandi, Yousef Iskander, and Prabhat Mishra. 2018. Scalable Hardware Trojan Activation by Interleaving Concrete Simulation and Symbolic Execution. In IEEE International Test Conference, ITC 2018. 1--10.Google ScholarCross Ref
- Bharathan Balaji, et al. 2012. Accurate Characterization of the Variability in Power Consumption in Modern Mobile Processors. In Workshop on Power-Aware Computing and Systems.Google Scholar
- Rajat Subhra Chakraborty et al. 2009. MERO: A Statistical Approach for Hardware Trojan Detection. In Cryptographic Hardware and Embedded Systems. 396--410.Google Scholar
- Mingsong Chen and Prabhat Mishra. 2010. Functional Test Generation Using Efficient Property Clustering and Learning Techniques. IEEE Trans. on CAD of Integrated Circuits and Systems 29, 3 (2010), 396--404.Google ScholarDigital Library
- H, Choo et al. 2020. Register-Transfer-Level Features for Machine-Learning-Based Hardware Trojan Detection. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A. 2 (2020), 502--509.Google Scholar
- Jonathan Cruz, Farimah Farahmandi, Alif Ahmed, and Prabhat Mishra. 2018. Hardware Trojan Detection Using ATPG and Model Checking. In International Conference on VLSI Design. 91--96.Google Scholar
- Jonathan Cruz, Yuanwen Huang, Prabhat Mishra, and Swarup Bhunia. 2018. An automated configurable Trojan insertion framework for dynamic trust benchmarks. In Design, Automation & Test in Europe Conference (DATE). 1598--1603.Google Scholar
- Leonardo Mendonça de Moura and Nikolaj Bjørner. 2008. Z3: An Efficient SMT Solver. In Tools and Algorithms for the Construction and Analysis of Systems, 14th International Conference, TACAS. 337--340.Google Scholar
- Rana Elnaggar and Krishnendu Chakrabarty. 2018. Machine Learning for Hardware Security: Opportunities and Risks. J. Electronic Testing 34, 2 (2018), 183--201.Google ScholarDigital Library
- Farimah Farahmandi, Yuanwen Huang, and Prabhat Mishra. 2017. Trojan localization using symbolic algebra. In 22nd Asia and South Pacific Design Automation Conference (ASP-DAC). 591--597.Google ScholarCross Ref
- Farimah Farahmandi and Prabhat Mishra. 2019. Automated Test Generation for Debugging Multiple Bugs in Arithmetic Circuits. IEEE Trans. Computers 68, 2 (2019), 182--197.Google ScholarDigital Library
- Anna Goldie and Azalia Mirhoseini. 2020. Placement Optimization with Deep Reinforcement Learning. CoRR abs/2003.08445 (2020).Google Scholar
- Yi Han, Sriharsha Etigowni, Hua Liu, Saman A. Zonouz, and Athina P. Petropulu. 2017. Watch Me, but Don't Touch Mel Contactless Control Flow Monitoring via Electromagnetic Emanations. In Proceedings of the 2017 ACM. 1095--1108.Google Scholar
- Yuanwen Huang, Swarup Bhunia, and Prabhat Mishra. 2016. MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection. In ACM SIGSAC Conference on Computer and Communications Security. 130--141.Google ScholarDigital Library
- Yuanwen Huang, Swarup Bhunia, and Prabhat Mishra. 2018. Scalable Test Generation for Trojan Detection Using Side Channel Analysis. IEEE Trans. Information Forensics and Security 13, 11 (2018), 2746--2760.Google ScholarCross Ref
- Sami Khairy, Ruslan Shaydulin, Lukasz Cincio, Yuri Alexeev, and Prasanna Balaprakash. 2019. Reinforcement-Learning-Based Variational Quantum Circuits Optimization for Combinatorial Problems. CoRR abs/1911.04574 (2019).Google Scholar
- Yangdi Lyu and Prabhat Mishra. 2018. A Survey of Side-Channel Attacks on Caches and Countermeasures. J. Hardware and Systems Security 2, 1 (2018), 33--50.Google ScholarCross Ref
- Yangdi Lyu and Prabhat Mishra. 2019. Efficient Test Generation for Trojan Detection using Side Channel Analysis. In Design, Automation & Test in Europe Conference (DATE). 408--413.Google Scholar
- Yangdi Lyu and Prabhat Mishra. 2020. Automated Test Generation for Trojan Detection using Delay-based Side Channel Analysis. In Design, Automation & Test in Europe Conference (DATE).Google Scholar
- M. Pecht and S. Tiku. 2006. Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronics, IEEE Spectrum 43, 5 (2006), 37--46.Google ScholarDigital Library
- Devendra Rai and John Lach. 2009. Performance of Delay-Based Trojan Detection Techniques under Parameter Variations. In IEEE International Workshop on Hardware-Oriented Security and Trust, HOST. 58--65.Google ScholarDigital Library
- Mohammad Tehranipoor and Farinaz Koushanfar. 2010. A Survey of Hardware Trojan Taxonomy and Detection. IEEE Des. Test Comput. 27, 1 (2010), 10--25.Google ScholarDigital Library
- John Villasenor and Mark Tehranipoor. 2013. Chop shop electronics. Spectrum, IEEE 50 (10 2013), 41--45. Google ScholarCross Ref
- Ronald J. Williams. 1992. Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning. Mach. Learn. 8 (1992), 229--256.Google ScholarDigital Library
- Chunyi Wu et al. 2019. Explore Deep Neural Network and Reinforcement Learning to Large-scale Tasks Processing in Big Data. Int. J. Pattern Recognit Artif. Intell. 33, 13 (2019), 1951010:1--1951010:29.Google Scholar
Index Terms
- Test generation using reinforcement learning for delay-based side-channel analysis
Recommendations
Automated test generation for trojan detection using delay-based side channel analysis
DATE '20: Proceedings of the 23rd Conference on Design, Automation and Test in EuropeSide-channel analysis is widely used for hardware Trojan detection in integrated circuits by analyzing various side-channel signatures, such as timing, power and path delay. Existing delay-based side-channel analysis techniques have two major bottlenecks:...
Reinforcement Learning-Based Design of Side-Channel Countermeasures
Security, Privacy, and Applied Cryptography EngineeringAbstractDeep learning-based side-channel attacks are capable of breaking targets protected with countermeasures. The constant progress in the last few years makes the attacks more powerful, requiring fewer traces to break a target. Unfortunately, to ...
Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning
ICCNS '18: Proceedings of the 8th International Conference on Communication and Network SecurityMalware detection is getting more and more attention due to the rapid growth of new malware. As a result, machine learning (ML) has become a popular way to detect malware variants. However, machine learning models can also be cheated. Through ...
Comments