Loading…
Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists
Recently, with the increase in outsourcing of IC design and manufacturing, the possibility of inserting hardware Trojans, which are circuits with malicious functions, has been pointed out. To prevent this threat, a method to identify hardware Trojans using neural networks has been proposed. On the o...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 7 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Yamashita, Kazuki Kato, Tomohiro Hasegawa, Kento Hidano, Seira Fukushima, Kazuhide Togawa, Nozomu |
description | Recently, with the increase in outsourcing of IC design and manufacturing, the possibility of inserting hardware Trojans, which are circuits with malicious functions, has been pointed out. To prevent this threat, a method to identify hardware Trojans using neural networks has been proposed. On the other hand, adversarial attacks have emerged that modify circuit design information to reduce the accuracy of hardware-Trojan classification by neural networks. Since the features designed by existing methods do not take the attacks into account, it is necessary to consider a new method for countermeasures. In this paper, out of 76 features that are strongly related to hardware-Trojan features, we investigate them from the viewpoint of the robustness against the adversarial attacks on circuit design information and newly propose 24 hardware-Trojan features. We compare the classifiers using the proposed 24 features with the classifiers using 11, 36, 51, and 76 existing features, respectively and confirm that the proposed ones are more robust in identifying hardware Trojans in circuits subjected to the adversarial attacks. |
doi_str_mv | 10.1109/IOLTS56730.2022.9897557 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9897557</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9897557</ieee_id><sourcerecordid>9897557</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-896f5b18b3e9e42a181828b369634fe6a94d670f0050fef6e16ebcb68f2dbe913</originalsourceid><addsrcrecordid>eNotkM1KAzEUhaMgWGufwIV5gan5mWRyl0PpHwx2YV2XO50bSR1bSeKob2_Brg4HPg4fh7FHKaZSCnhab5rti7GVFlMllJqCg8qY6opNoHLSWlNW2hh1zUYSSlVAKeQtu0vpIISxAGrEdnPvaZ_DQHyFsfvGSMU2ng545AvC_BWJz39yxDNyOvL6DcMxZV53A8WEMWDP65xx_544Zr7ETEVDA_X8mXIfUk737MZjn2hyyTF7Xcy3s1XRbJbrWd0UQQmdCwfWm1a6VhNQqVA66dS5WbC69GQRys5Wwp-9hSdvSVpq9611XnUtgdRj9vC_G4ho9xnDB8bf3eUP_Qe5pFZ6</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists</title><source>IEEE Xplore All Conference Series</source><creator>Yamashita, Kazuki ; Kato, Tomohiro ; Hasegawa, Kento ; Hidano, Seira ; Fukushima, Kazuhide ; Togawa, Nozomu</creator><creatorcontrib>Yamashita, Kazuki ; Kato, Tomohiro ; Hasegawa, Kento ; Hidano, Seira ; Fukushima, Kazuhide ; Togawa, Nozomu</creatorcontrib><description>Recently, with the increase in outsourcing of IC design and manufacturing, the possibility of inserting hardware Trojans, which are circuits with malicious functions, has been pointed out. To prevent this threat, a method to identify hardware Trojans using neural networks has been proposed. On the other hand, adversarial attacks have emerged that modify circuit design information to reduce the accuracy of hardware-Trojan classification by neural networks. Since the features designed by existing methods do not take the attacks into account, it is necessary to consider a new method for countermeasures. In this paper, out of 76 features that are strongly related to hardware-Trojan features, we investigate them from the viewpoint of the robustness against the adversarial attacks on circuit design information and newly propose 24 hardware-Trojan features. We compare the classifiers using the proposed 24 features with the classifiers using 11, 36, 51, and 76 existing features, respectively and confirm that the proposed ones are more robust in identifying hardware Trojans in circuits subjected to the adversarial attacks.</description><identifier>EISSN: 1942-9401</identifier><identifier>EISBN: 9781665473552</identifier><identifier>EISBN: 166547355X</identifier><identifier>DOI: 10.1109/IOLTS56730.2022.9897557</identifier><language>eng</language><publisher>IEEE</publisher><subject>adversarial attack ; Circuit synthesis ; Feature extraction ; gate-level netlist ; Hardware ; hardware Trojan ; machine learning ; Manufacturing ; neural network ; Neural networks ; Outsourcing ; Robustness</subject><ispartof>2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS), 2022, p.1-7</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9897557$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27924,54554,54931</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9897557$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yamashita, Kazuki</creatorcontrib><creatorcontrib>Kato, Tomohiro</creatorcontrib><creatorcontrib>Hasegawa, Kento</creatorcontrib><creatorcontrib>Hidano, Seira</creatorcontrib><creatorcontrib>Fukushima, Kazuhide</creatorcontrib><creatorcontrib>Togawa, Nozomu</creatorcontrib><title>Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists</title><title>2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)</title><addtitle>IOLTS</addtitle><description>Recently, with the increase in outsourcing of IC design and manufacturing, the possibility of inserting hardware Trojans, which are circuits with malicious functions, has been pointed out. To prevent this threat, a method to identify hardware Trojans using neural networks has been proposed. On the other hand, adversarial attacks have emerged that modify circuit design information to reduce the accuracy of hardware-Trojan classification by neural networks. Since the features designed by existing methods do not take the attacks into account, it is necessary to consider a new method for countermeasures. In this paper, out of 76 features that are strongly related to hardware-Trojan features, we investigate them from the viewpoint of the robustness against the adversarial attacks on circuit design information and newly propose 24 hardware-Trojan features. We compare the classifiers using the proposed 24 features with the classifiers using 11, 36, 51, and 76 existing features, respectively and confirm that the proposed ones are more robust in identifying hardware Trojans in circuits subjected to the adversarial attacks.</description><subject>adversarial attack</subject><subject>Circuit synthesis</subject><subject>Feature extraction</subject><subject>gate-level netlist</subject><subject>Hardware</subject><subject>hardware Trojan</subject><subject>machine learning</subject><subject>Manufacturing</subject><subject>neural network</subject><subject>Neural networks</subject><subject>Outsourcing</subject><subject>Robustness</subject><issn>1942-9401</issn><isbn>9781665473552</isbn><isbn>166547355X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2022</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkM1KAzEUhaMgWGufwIV5gan5mWRyl0PpHwx2YV2XO50bSR1bSeKob2_Brg4HPg4fh7FHKaZSCnhab5rti7GVFlMllJqCg8qY6opNoHLSWlNW2hh1zUYSSlVAKeQtu0vpIISxAGrEdnPvaZ_DQHyFsfvGSMU2ng545AvC_BWJz39yxDNyOvL6DcMxZV53A8WEMWDP65xx_544Zr7ETEVDA_X8mXIfUk737MZjn2hyyTF7Xcy3s1XRbJbrWd0UQQmdCwfWm1a6VhNQqVA66dS5WbC69GQRys5Wwp-9hSdvSVpq9611XnUtgdRj9vC_G4ho9xnDB8bf3eUP_Qe5pFZ6</recordid><startdate>20220912</startdate><enddate>20220912</enddate><creator>Yamashita, Kazuki</creator><creator>Kato, Tomohiro</creator><creator>Hasegawa, Kento</creator><creator>Hidano, Seira</creator><creator>Fukushima, Kazuhide</creator><creator>Togawa, Nozomu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20220912</creationdate><title>Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists</title><author>Yamashita, Kazuki ; Kato, Tomohiro ; Hasegawa, Kento ; Hidano, Seira ; Fukushima, Kazuhide ; Togawa, Nozomu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-896f5b18b3e9e42a181828b369634fe6a94d670f0050fef6e16ebcb68f2dbe913</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2022</creationdate><topic>adversarial attack</topic><topic>Circuit synthesis</topic><topic>Feature extraction</topic><topic>gate-level netlist</topic><topic>Hardware</topic><topic>hardware Trojan</topic><topic>machine learning</topic><topic>Manufacturing</topic><topic>neural network</topic><topic>Neural networks</topic><topic>Outsourcing</topic><topic>Robustness</topic><toplevel>online_resources</toplevel><creatorcontrib>Yamashita, Kazuki</creatorcontrib><creatorcontrib>Kato, Tomohiro</creatorcontrib><creatorcontrib>Hasegawa, Kento</creatorcontrib><creatorcontrib>Hidano, Seira</creatorcontrib><creatorcontrib>Fukushima, Kazuhide</creatorcontrib><creatorcontrib>Togawa, Nozomu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yamashita, Kazuki</au><au>Kato, Tomohiro</au><au>Hasegawa, Kento</au><au>Hidano, Seira</au><au>Fukushima, Kazuhide</au><au>Togawa, Nozomu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists</atitle><btitle>2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)</btitle><stitle>IOLTS</stitle><date>2022-09-12</date><risdate>2022</risdate><spage>1</spage><epage>7</epage><pages>1-7</pages><eissn>1942-9401</eissn><eisbn>9781665473552</eisbn><eisbn>166547355X</eisbn><abstract>Recently, with the increase in outsourcing of IC design and manufacturing, the possibility of inserting hardware Trojans, which are circuits with malicious functions, has been pointed out. To prevent this threat, a method to identify hardware Trojans using neural networks has been proposed. On the other hand, adversarial attacks have emerged that modify circuit design information to reduce the accuracy of hardware-Trojan classification by neural networks. Since the features designed by existing methods do not take the attacks into account, it is necessary to consider a new method for countermeasures. In this paper, out of 76 features that are strongly related to hardware-Trojan features, we investigate them from the viewpoint of the robustness against the adversarial attacks on circuit design information and newly propose 24 hardware-Trojan features. We compare the classifiers using the proposed 24 features with the classifiers using 11, 36, 51, and 76 existing features, respectively and confirm that the proposed ones are more robust in identifying hardware Trojans in circuits subjected to the adversarial attacks.</abstract><pub>IEEE</pub><doi>10.1109/IOLTS56730.2022.9897557</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 1942-9401 |
ispartof | 2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS), 2022, p.1-7 |
issn | 1942-9401 |
language | eng |
recordid | cdi_ieee_primary_9897557 |
source | IEEE Xplore All Conference Series |
subjects | adversarial attack Circuit synthesis Feature extraction gate-level netlist Hardware hardware Trojan machine learning Manufacturing neural network Neural networks Outsourcing Robustness |
title | Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T20%3A22%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Effective%20Hardware-Trojan%20Feature%20Extraction%20Against%20Adversarial%20Attacks%20at%20Gate-Level%20Netlists&rft.btitle=2022%20IEEE%2028th%20International%20Symposium%20on%20On-Line%20Testing%20and%20Robust%20System%20Design%20(IOLTS)&rft.au=Yamashita,%20Kazuki&rft.date=2022-09-12&rft.spage=1&rft.epage=7&rft.pages=1-7&rft.eissn=1942-9401&rft_id=info:doi/10.1109/IOLTS56730.2022.9897557&rft.eisbn=9781665473552&rft.eisbn_list=166547355X&rft_dat=%3Cieee_CHZPO%3E9897557%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-896f5b18b3e9e42a181828b369634fe6a94d670f0050fef6e16ebcb68f2dbe913%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9897557&rfr_iscdi=true |