Loading…

Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists

Recently, with the increase in outsourcing of IC design and manufacturing, the possibility of inserting hardware Trojans, which are circuits with malicious functions, has been pointed out. To prevent this threat, a method to identify hardware Trojans using neural networks has been proposed. On the o...

Full description

Saved in:
Bibliographic Details
Main Authors: Yamashita, Kazuki, Kato, Tomohiro, Hasegawa, Kento, Hidano, Seira, Fukushima, Kazuhide, Togawa, Nozomu
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 7
container_issue
container_start_page 1
container_title
container_volume
creator Yamashita, Kazuki
Kato, Tomohiro
Hasegawa, Kento
Hidano, Seira
Fukushima, Kazuhide
Togawa, Nozomu
description Recently, with the increase in outsourcing of IC design and manufacturing, the possibility of inserting hardware Trojans, which are circuits with malicious functions, has been pointed out. To prevent this threat, a method to identify hardware Trojans using neural networks has been proposed. On the other hand, adversarial attacks have emerged that modify circuit design information to reduce the accuracy of hardware-Trojan classification by neural networks. Since the features designed by existing methods do not take the attacks into account, it is necessary to consider a new method for countermeasures. In this paper, out of 76 features that are strongly related to hardware-Trojan features, we investigate them from the viewpoint of the robustness against the adversarial attacks on circuit design information and newly propose 24 hardware-Trojan features. We compare the classifiers using the proposed 24 features with the classifiers using 11, 36, 51, and 76 existing features, respectively and confirm that the proposed ones are more robust in identifying hardware Trojans in circuits subjected to the adversarial attacks.
doi_str_mv 10.1109/IOLTS56730.2022.9897557
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9897557</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9897557</ieee_id><sourcerecordid>9897557</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-896f5b18b3e9e42a181828b369634fe6a94d670f0050fef6e16ebcb68f2dbe913</originalsourceid><addsrcrecordid>eNotkM1KAzEUhaMgWGufwIV5gan5mWRyl0PpHwx2YV2XO50bSR1bSeKob2_Brg4HPg4fh7FHKaZSCnhab5rti7GVFlMllJqCg8qY6opNoHLSWlNW2hh1zUYSSlVAKeQtu0vpIISxAGrEdnPvaZ_DQHyFsfvGSMU2ng545AvC_BWJz39yxDNyOvL6DcMxZV53A8WEMWDP65xx_544Zr7ETEVDA_X8mXIfUk737MZjn2hyyTF7Xcy3s1XRbJbrWd0UQQmdCwfWm1a6VhNQqVA66dS5WbC69GQRys5Wwp-9hSdvSVpq9611XnUtgdRj9vC_G4ho9xnDB8bf3eUP_Qe5pFZ6</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists</title><source>IEEE Xplore All Conference Series</source><creator>Yamashita, Kazuki ; Kato, Tomohiro ; Hasegawa, Kento ; Hidano, Seira ; Fukushima, Kazuhide ; Togawa, Nozomu</creator><creatorcontrib>Yamashita, Kazuki ; Kato, Tomohiro ; Hasegawa, Kento ; Hidano, Seira ; Fukushima, Kazuhide ; Togawa, Nozomu</creatorcontrib><description>Recently, with the increase in outsourcing of IC design and manufacturing, the possibility of inserting hardware Trojans, which are circuits with malicious functions, has been pointed out. To prevent this threat, a method to identify hardware Trojans using neural networks has been proposed. On the other hand, adversarial attacks have emerged that modify circuit design information to reduce the accuracy of hardware-Trojan classification by neural networks. Since the features designed by existing methods do not take the attacks into account, it is necessary to consider a new method for countermeasures. In this paper, out of 76 features that are strongly related to hardware-Trojan features, we investigate them from the viewpoint of the robustness against the adversarial attacks on circuit design information and newly propose 24 hardware-Trojan features. We compare the classifiers using the proposed 24 features with the classifiers using 11, 36, 51, and 76 existing features, respectively and confirm that the proposed ones are more robust in identifying hardware Trojans in circuits subjected to the adversarial attacks.</description><identifier>EISSN: 1942-9401</identifier><identifier>EISBN: 9781665473552</identifier><identifier>EISBN: 166547355X</identifier><identifier>DOI: 10.1109/IOLTS56730.2022.9897557</identifier><language>eng</language><publisher>IEEE</publisher><subject>adversarial attack ; Circuit synthesis ; Feature extraction ; gate-level netlist ; Hardware ; hardware Trojan ; machine learning ; Manufacturing ; neural network ; Neural networks ; Outsourcing ; Robustness</subject><ispartof>2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS), 2022, p.1-7</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9897557$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27924,54554,54931</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9897557$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yamashita, Kazuki</creatorcontrib><creatorcontrib>Kato, Tomohiro</creatorcontrib><creatorcontrib>Hasegawa, Kento</creatorcontrib><creatorcontrib>Hidano, Seira</creatorcontrib><creatorcontrib>Fukushima, Kazuhide</creatorcontrib><creatorcontrib>Togawa, Nozomu</creatorcontrib><title>Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists</title><title>2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)</title><addtitle>IOLTS</addtitle><description>Recently, with the increase in outsourcing of IC design and manufacturing, the possibility of inserting hardware Trojans, which are circuits with malicious functions, has been pointed out. To prevent this threat, a method to identify hardware Trojans using neural networks has been proposed. On the other hand, adversarial attacks have emerged that modify circuit design information to reduce the accuracy of hardware-Trojan classification by neural networks. Since the features designed by existing methods do not take the attacks into account, it is necessary to consider a new method for countermeasures. In this paper, out of 76 features that are strongly related to hardware-Trojan features, we investigate them from the viewpoint of the robustness against the adversarial attacks on circuit design information and newly propose 24 hardware-Trojan features. We compare the classifiers using the proposed 24 features with the classifiers using 11, 36, 51, and 76 existing features, respectively and confirm that the proposed ones are more robust in identifying hardware Trojans in circuits subjected to the adversarial attacks.</description><subject>adversarial attack</subject><subject>Circuit synthesis</subject><subject>Feature extraction</subject><subject>gate-level netlist</subject><subject>Hardware</subject><subject>hardware Trojan</subject><subject>machine learning</subject><subject>Manufacturing</subject><subject>neural network</subject><subject>Neural networks</subject><subject>Outsourcing</subject><subject>Robustness</subject><issn>1942-9401</issn><isbn>9781665473552</isbn><isbn>166547355X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2022</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkM1KAzEUhaMgWGufwIV5gan5mWRyl0PpHwx2YV2XO50bSR1bSeKob2_Brg4HPg4fh7FHKaZSCnhab5rti7GVFlMllJqCg8qY6opNoHLSWlNW2hh1zUYSSlVAKeQtu0vpIISxAGrEdnPvaZ_DQHyFsfvGSMU2ng545AvC_BWJz39yxDNyOvL6DcMxZV53A8WEMWDP65xx_544Zr7ETEVDA_X8mXIfUk737MZjn2hyyTF7Xcy3s1XRbJbrWd0UQQmdCwfWm1a6VhNQqVA66dS5WbC69GQRys5Wwp-9hSdvSVpq9611XnUtgdRj9vC_G4ho9xnDB8bf3eUP_Qe5pFZ6</recordid><startdate>20220912</startdate><enddate>20220912</enddate><creator>Yamashita, Kazuki</creator><creator>Kato, Tomohiro</creator><creator>Hasegawa, Kento</creator><creator>Hidano, Seira</creator><creator>Fukushima, Kazuhide</creator><creator>Togawa, Nozomu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20220912</creationdate><title>Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists</title><author>Yamashita, Kazuki ; Kato, Tomohiro ; Hasegawa, Kento ; Hidano, Seira ; Fukushima, Kazuhide ; Togawa, Nozomu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-896f5b18b3e9e42a181828b369634fe6a94d670f0050fef6e16ebcb68f2dbe913</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2022</creationdate><topic>adversarial attack</topic><topic>Circuit synthesis</topic><topic>Feature extraction</topic><topic>gate-level netlist</topic><topic>Hardware</topic><topic>hardware Trojan</topic><topic>machine learning</topic><topic>Manufacturing</topic><topic>neural network</topic><topic>Neural networks</topic><topic>Outsourcing</topic><topic>Robustness</topic><toplevel>online_resources</toplevel><creatorcontrib>Yamashita, Kazuki</creatorcontrib><creatorcontrib>Kato, Tomohiro</creatorcontrib><creatorcontrib>Hasegawa, Kento</creatorcontrib><creatorcontrib>Hidano, Seira</creatorcontrib><creatorcontrib>Fukushima, Kazuhide</creatorcontrib><creatorcontrib>Togawa, Nozomu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yamashita, Kazuki</au><au>Kato, Tomohiro</au><au>Hasegawa, Kento</au><au>Hidano, Seira</au><au>Fukushima, Kazuhide</au><au>Togawa, Nozomu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists</atitle><btitle>2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)</btitle><stitle>IOLTS</stitle><date>2022-09-12</date><risdate>2022</risdate><spage>1</spage><epage>7</epage><pages>1-7</pages><eissn>1942-9401</eissn><eisbn>9781665473552</eisbn><eisbn>166547355X</eisbn><abstract>Recently, with the increase in outsourcing of IC design and manufacturing, the possibility of inserting hardware Trojans, which are circuits with malicious functions, has been pointed out. To prevent this threat, a method to identify hardware Trojans using neural networks has been proposed. On the other hand, adversarial attacks have emerged that modify circuit design information to reduce the accuracy of hardware-Trojan classification by neural networks. Since the features designed by existing methods do not take the attacks into account, it is necessary to consider a new method for countermeasures. In this paper, out of 76 features that are strongly related to hardware-Trojan features, we investigate them from the viewpoint of the robustness against the adversarial attacks on circuit design information and newly propose 24 hardware-Trojan features. We compare the classifiers using the proposed 24 features with the classifiers using 11, 36, 51, and 76 existing features, respectively and confirm that the proposed ones are more robust in identifying hardware Trojans in circuits subjected to the adversarial attacks.</abstract><pub>IEEE</pub><doi>10.1109/IOLTS56730.2022.9897557</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 1942-9401
ispartof 2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS), 2022, p.1-7
issn 1942-9401
language eng
recordid cdi_ieee_primary_9897557
source IEEE Xplore All Conference Series
subjects adversarial attack
Circuit synthesis
Feature extraction
gate-level netlist
Hardware
hardware Trojan
machine learning
Manufacturing
neural network
Neural networks
Outsourcing
Robustness
title Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T20%3A22%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Effective%20Hardware-Trojan%20Feature%20Extraction%20Against%20Adversarial%20Attacks%20at%20Gate-Level%20Netlists&rft.btitle=2022%20IEEE%2028th%20International%20Symposium%20on%20On-Line%20Testing%20and%20Robust%20System%20Design%20(IOLTS)&rft.au=Yamashita,%20Kazuki&rft.date=2022-09-12&rft.spage=1&rft.epage=7&rft.pages=1-7&rft.eissn=1942-9401&rft_id=info:doi/10.1109/IOLTS56730.2022.9897557&rft.eisbn=9781665473552&rft.eisbn_list=166547355X&rft_dat=%3Cieee_CHZPO%3E9897557%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-896f5b18b3e9e42a181828b369634fe6a94d670f0050fef6e16ebcb68f2dbe913%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9897557&rfr_iscdi=true