Logic Locking at the Frontiers of Machine Learning: A Survey on
Developments and Opportunities
- URL: http://arxiv.org/abs/2107.01915v2
- Date: Tue, 6 Jul 2021 09:19:20 GMT
- Title: Logic Locking at the Frontiers of Machine Learning: A Survey on
Developments and Opportunities
- Authors: Dominik Sisejkovic, Lennart M. Reimann, Elmira Moussavi, Farhad
Merchant, Rainer Leupers
- Abstract summary: This paper summarizes the recent developments in logic locking attacks and countermeasures at the frontiers of contemporary machine learning models.
Based on the presented work, the key takeaways, opportunities, and challenges are highlighted to offer recommendations for the design of next-generation logic locking.
- Score: 0.6287267171078441
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In the past decade, a lot of progress has been made in the design and
evaluation of logic locking; a premier technique to safeguard the integrity of
integrated circuits throughout the electronics supply chain. However, the
widespread proliferation of machine learning has recently introduced a new
pathway to evaluating logic locking schemes. This paper summarizes the recent
developments in logic locking attacks and countermeasures at the frontiers of
contemporary machine learning models. Based on the presented work, the key
takeaways, opportunities, and challenges are highlighted to offer
recommendations for the design of next-generation logic locking.
Related papers
- Exploiting the Lock: Leveraging MiG-V's Logic Locking for Secret-Data Extraction [0.16492989697868893]
MiG-V is the first commercially available logic-locked RISC-V processor.
We show that changing a single bit of the logic locking key can expose 100% of the cryptographic encryption key.
arXiv Detail & Related papers (2024-08-09T09:59:23Z) - The Buffer Mechanism for Multi-Step Information Reasoning in Language Models [52.77133661679439]
Investigating internal reasoning mechanisms of large language models can help us design better model architectures and training strategies.
In this study, we constructed a symbolic dataset to investigate the mechanisms by which Transformer models employ vertical thinking strategy.
We proposed a random matrix-based algorithm to enhance the model's reasoning ability, resulting in a 75% reduction in the training time required for the GPT-2 model.
arXiv Detail & Related papers (2024-05-24T07:41:26Z) - LIPSTICK: Corruptibility-Aware and Explainable Graph Neural Network-based Oracle-Less Attack on Logic Locking [1.104960878651584]
We develop, train, and test a corruptibility-aware graph neural network-based oracle-less attack on logic locking.
Our model is explainable in the sense that we analyze what the machine learning model has interpreted in the training process and how it can perform a successful attack.
arXiv Detail & Related papers (2024-02-06T18:42:51Z) - Logic-induced Diagnostic Reasoning for Semi-supervised Semantic
Segmentation [85.12429517510311]
LogicDiag is a neural-logic semi-supervised learning framework for semantic segmentation.
Our key insight is that conflicts within pseudo labels, identified through symbolic knowledge, can serve as strong yet commonly ignored learning signals.
We showcase the practical application of LogicDiag in the data-hungry segmentation scenario, where we formalize the structured abstraction of semantic concepts as a set of logic rules.
arXiv Detail & Related papers (2023-08-24T06:50:07Z) - Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A
Contemporary Survey [114.17568992164303]
Adrial attacks and defenses in machine learning and deep neural network have been gaining significant attention.
This survey provides a comprehensive overview of the recent advancements in the field of adversarial attack and defense techniques.
New avenues of attack are also explored, including search-based, decision-based, drop-based, and physical-world attacks.
arXiv Detail & Related papers (2023-03-11T04:19:31Z) - Towards Machine Learning for Placement and Routing in Chip Design: a
Methodological Overview [72.79089075263985]
Placement and routing are two indispensable and challenging (NP-hard) tasks in modern chip design flows.
Machine learning has shown promising prospects by its data-driven nature, which can be of less reliance on knowledge and priors.
arXiv Detail & Related papers (2022-02-28T06:28:44Z) - A Critical Review of Inductive Logic Programming Techniques for
Explainable AI [9.028858411921906]
Inductive Logic Programming (ILP) is a subfield of symbolic artificial intelligence.
ILP generates explainable first-order clausal theories from examples and background knowledge.
Existing ILP systems often have a vast solution space, and the induced solutions are very sensitive to noises and disturbances.
arXiv Detail & Related papers (2021-12-31T06:34:32Z) - Logical blocks for fault-tolerant topological quantum computation [55.41644538483948]
We present a framework for universal fault-tolerant logic motivated by the need for platform-independent logical gate definitions.
We explore novel schemes for universal logic that improve resource overheads.
Motivated by the favorable logical error rates for boundaryless computation, we introduce a novel computational scheme.
arXiv Detail & Related papers (2021-12-22T19:00:03Z) - Deceptive Logic Locking for Hardware Integrity Protection against
Machine Learning Attacks [0.6868387710209244]
We present a theoretical model to test locking schemes for key-related structural leakage that can be exploited by machine learning.
We introduce D-MUX: a deceptive multiplexer-based logic-locking scheme that is resilient against structure-exploiting machine learning attacks.
To the best of our knowledge, D-MUX is the first machine-learning-resilient locking scheme capable of protecting against all known learning-based attacks.
arXiv Detail & Related papers (2021-07-19T09:08:14Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - Challenging the Security of Logic Locking Schemes in the Era of Deep
Learning: A Neuroevolutionary Approach [0.2982610402087727]
Deep learning is being introduced in the domain of logic locking.
We present SnapShot: a novel attack on logic locking that is the first of its kind to utilize artificial neural networks.
We show that SnapShot achieves an average key prediction accuracy of 82.60% for the selected attack scenario.
arXiv Detail & Related papers (2020-11-20T13:03:19Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.