skip to main content
10.1145/3526241.3530379acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
short-paper

Hardware Trojan Insertion Using Reinforcement Learning

Published:06 June 2022Publication History

ABSTRACT

This paper utilizes Reinforcement Learning (RL) as a means to automate the Hardware Trojan (HT) insertion process to eliminate the inherent human biases that limit the development of robust HT detection methods. An RL agent explores the design space and finds circuit locations that are best for keeping inserted HTs hidden. To achieve this, a digital circuit is converted to an environment in which an RL agent inserts HTs such that the cumulative reward is maximized. Our toolset can insert combinational HTs into the ISCAS-85 benchmark suite with variations in HT size and triggering conditions. Experimental results show that the toolset achieves high input coverage rates (100% in two benchmark circuits) that confirms its effectiveness. Also, the inserted HTs have shown a minimal footprint and rare activation probability.

Skip Supplemental Material Section

Supplemental Material

video1161549663.mp4

mp4

45.3 MB

References

  1. L. Bassett. 2015. Introduction to JavaScript Object Notation: A To-the-Point Guide to JSON. O'Reilly Media. 2015510525 https://books.google.com/books?id=Qv9PCgAAQBAJGoogle ScholarGoogle Scholar
  2. Michael L Bushnell. 2000. Essentials of electronic testing for digital. Memory & Mixed-Signal VLSI Circuits (2000).Google ScholarGoogle Scholar
  3. Jonathan Cruz, Yuanwen Huang, Prabhat Mishra, and Swarup Bhunia. 2018. An automated configurable Trojan insertion framework for dynamic trust benchmarks. In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1598--1603.Google ScholarGoogle Scholar
  4. Lawrence H Goldstein and Evelyn L Thigpen. 1980. SCOAP: Sandia controllability/observability analysis program. In Proceedings of the 17th Design Automation Conference. 190--196.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Aric A. Hagberg, Daniel A. Schult, and Pieter J. Swart. 2008. Exploring Network Structure, Dynamics, and Function using NetworkX. In Proceedings of the 7th Python in Science Conference, Gaël Varoquaux, Travis Vaught, and Jarrod Millman (Eds.). Pasadena, CA USA, 11 -- 15.Google ScholarGoogle Scholar
  6. Kento Hasegawa, Masao Yanagisawa, and Nozomu Togawa. 2017. Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier. In 2017 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 1--4.Google ScholarGoogle ScholarCross RefCross Ref
  7. Zhixin Pan and Prabhat Mishra. 2021. Automated test generation for hardware trojan detection using reinforcement learning. In Proceedings of the 26th Asia and South Pacific Design Automation Conference. 408--413.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Antonin Raffin, Ashley Hill, Maximilian Ernestus, Adam Gleave, Anssi Kanervisto, and Noah Dormann. 2019. Stable baselines3. GitHub repository (2019).Google ScholarGoogle Scholar
  9. Mohammad Sabri, Ahmad Shabani, and Bijan Alizadeh. 2021. SAT-Based Integrated Hardware Trojan Detection and Localization Approach Through Path-Delay Analysis. IEEE Transactions on Circuits and Systems II: Express Briefs (2021).Google ScholarGoogle ScholarCross RefCross Ref
  10. Hassan Salmani. 2016. COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Transactions on Information Forensics and Security, Vol. 12, 2 (2016), 338--350.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hassan Salmani, Mohammad Tehranipoor, and Ramesh Karri. 2013. On design vulnerability analysis and trust benchmarks development. In 2013 IEEE 31st international conference on computer design (ICCD). IEEE, 471--474.Google ScholarGoogle ScholarCross RefCross Ref
  12. Amin Sarihi, Ahmad Patooghy, Ahmed Khalid, Mahdi Hasanzadeh, Mostafa Said, and Abdel-Hameed A Badawy. 2021. A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips. IEEE Access (2021).Google ScholarGoogle ScholarCross RefCross Ref
  13. John Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov. 2017. Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017).Google ScholarGoogle Scholar
  14. Seyed Mohammad Sebt, Ahmad Patooghy, Hakem Beitollahi, and Michel Kinsy. 2018. Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs. IET Computers & Digital Techniques, Vol. 12, 6 (2018), 251--257.Google ScholarGoogle ScholarCross RefCross Ref
  15. Bicky Shakya, Tony He, Hassan Salmani, Domenic Forte, Swarup Bhunia, and Mark Tehranipoor. 2017. Benchmarking of hardware trojans and maliciously affected circuits. Journal of Hardware and Systems Security, Vol. 1, 1 (2017), 85--102.Google ScholarGoogle ScholarCross RefCross Ref
  16. Clifford Wolf, Johann Glaser, and Johannes Kepler. 2013. Yosys-a free Verilog synthesis suite. In Proceedings of the 21st Austrian Workshop on Microelectronics (Austrochip) .Google ScholarGoogle Scholar
  17. Mingfu Xue, Chongyan Gu, Weiqiang Liu, Shichao Yu, and Máire O'Neill. 2020. Ten years of hardware Trojans: a survey from the attacker's perspective. IET Computers & Digital Techniques, Vol. 14, 6 (2020), 231--246.Google ScholarGoogle ScholarCross RefCross Ref
  18. Shichao Yu, Weiqiang Liu, and Maire O'Neill. 2019. An improved automatic hardware Trojan generation platform. In 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 302--307.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Hardware Trojan Insertion Using Reinforcement Learning

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        GLSVLSI '22: Proceedings of the Great Lakes Symposium on VLSI 2022
        June 2022
        560 pages
        ISBN:9781450393225
        DOI:10.1145/3526241

        Copyright © 2022 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 6 June 2022

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        Overall Acceptance Rate312of1,156submissions,27%

        Upcoming Conference

        GLSVLSI '24
        Great Lakes Symposium on VLSI 2024
        June 12 - 14, 2024
        Clearwater , FL , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader