Hardware Trojan Insertion Using Reinforcement Learning
- URL: http://arxiv.org/abs/2204.04350v1
- Date: Sat, 9 Apr 2022 01:50:03 GMT
- Title: Hardware Trojan Insertion Using Reinforcement Learning
- Authors: Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy
- Abstract summary: This paper utilizes Reinforcement Learning (RL) as a means to automate the Hardware Trojan (HT) insertion process.
An RL agent explores the design space and finds circuit locations that are best for keeping inserted HTs hidden.
Our toolset can insert combinational HTs into the ISCAS-85 benchmark suite with variations in HT size and triggering conditions.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: This paper utilizes Reinforcement Learning (RL) as a means to automate the
Hardware Trojan (HT) insertion process to eliminate the inherent human biases
that limit the development of robust HT detection methods. An RL agent explores
the design space and finds circuit locations that are best for keeping inserted
HTs hidden. To achieve this, a digital circuit is converted to an environment
in which an RL agent inserts HTs such that the cumulative reward is maximized.
Our toolset can insert combinational HTs into the ISCAS-85 benchmark suite with
variations in HT size and triggering conditions. Experimental results show that
the toolset achieves high input coverage rates (100\% in two benchmark
circuits) that confirms its effectiveness. Also, the inserted HTs have shown a
minimal footprint and rare activation probability.
Related papers
- Resultant: Incremental Effectiveness on Likelihood for Unsupervised Out-of-Distribution Detection [63.93728560200819]
Unsupervised out-of-distribution (U-OOD) detection is to identify data samples with a detector trained solely on unlabeled in-distribution (ID) data.
Recent studies have developed various detectors based on DGMs to move beyond likelihood.
We apply two techniques for each direction, specifically post-hoc prior and dataset entropy-mutual calibration.
Experimental results demonstrate that the Resultant could be a new state-of-the-art U-OOD detector.
arXiv Detail & Related papers (2024-09-05T02:58:13Z) - SENTAUR: Security EnhaNced Trojan Assessment Using LLMs Against Undesirable Revisions [17.21926121783922]
Hardware Trojan (HT) can introduce stealthy behavior, prevent an IC work as intended, or leak sensitive data via side channels.
To counter HTs, rapidly examining HT scenarios is a key requirement.
We propose a large language model (LLM) framework to generate a suite of legitimate HTs for a Register Transfer Level (RTL) design.
arXiv Detail & Related papers (2024-07-17T07:13:06Z) - TrojanForge: Generating Adversarial Hardware Trojan Examples with Reinforcement Learning [0.0]
Hardware Trojan problem can be thought of as a continuous game between attackers and defenders.
Machine Learning has recently played a key role in advancing HT research.
TrojanForge generates adversarial examples that defeat HT detectors.
arXiv Detail & Related papers (2024-05-24T03:37:32Z) - Lazy Layers to Make Fine-Tuned Diffusion Models More Traceable [70.77600345240867]
A novel arbitrary-in-arbitrary-out (AIAO) strategy makes watermarks resilient to fine-tuning-based removal.
Unlike the existing methods of designing a backdoor for the input/output space of diffusion models, in our method, we propose to embed the backdoor into the feature space of sampled subpaths.
Our empirical studies on the MS-COCO, AFHQ, LSUN, CUB-200, and DreamBooth datasets confirm the robustness of AIAO.
arXiv Detail & Related papers (2024-05-01T12:03:39Z) - Once for Both: Single Stage of Importance and Sparsity Search for Vision Transformer Compression [63.23578860867408]
We investigate how to integrate the evaluations of importance and sparsity scores into a single stage.
We present OFB, a cost-efficient approach that simultaneously evaluates both importance and sparsity scores.
Experiments demonstrate that OFB can achieve superior compression performance over state-of-the-art searching-based and pruning-based methods.
arXiv Detail & Related papers (2024-03-23T13:22:36Z) - Stop Regressing: Training Value Functions via Classification for
Scalable Deep RL [109.44370201929246]
We show that training value functions with categorical cross-entropy improves performance and scalability in a variety of domains.
These include: single-task RL on Atari 2600 games with SoftMoEs, multi-task RL on Atari with large-scale ResNets, robotic manipulation with Q-transformers, playing Chess without search, and a language-agent Wordle task with high-capacity Transformers.
arXiv Detail & Related papers (2024-03-06T18:55:47Z) - Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection [0.0]
Current Hardware Trojan (HT) detection techniques are mostly developed based on a limited set of HT benchmarks.
We introduce the first automated Reinforcement Learning (RL) HT insertion and detection framework to address these shortcomings.
arXiv Detail & Related papers (2023-05-16T16:42:07Z) - Multi-criteria Hardware Trojan Detection: A Reinforcement Learning
Approach [0.0]
Hardware Trojans (HTs) can severely alter the security and functionality of digital integrated circuits.
This paper proposes a multi-criteria reinforcement learning (RL) HT detection tool that features a tunable reward function for different HT detection scenarios.
Our preliminary results show an average of 84.2% successful HT detection in ISCAS-85 benchmark.
arXiv Detail & Related papers (2023-04-26T01:40:55Z) - DETERRENT: Detecting Trojans using Reinforcement Learning [8.9149615294509]
Hardware Trojans (HTs) are a pernicious threat to integrated circuits.
In this work, we design a reinforcement learning (RL) agent that circumvents the exponential search space and returns a minimal set of patterns that is most likely to detect HTs.
arXiv Detail & Related papers (2022-08-26T22:09:47Z) - Differentiable Architecture Search with Random Features [80.31916993541513]
Differentiable architecture search (DARTS) has significantly promoted the development of NAS techniques because of its high search efficiency and effectiveness but suffers from performance collapse.
In this paper, we make efforts to alleviate the performance collapse problem for DARTS with only training BatchNorm.
arXiv Detail & Related papers (2022-08-18T13:55:27Z) - Robust Deep Reinforcement Learning through Adversarial Loss [74.20501663956604]
Recent studies have shown that deep reinforcement learning agents are vulnerable to small adversarial perturbations on the agent's inputs.
We propose RADIAL-RL, a principled framework to train reinforcement learning agents with improved robustness against adversarial attacks.
arXiv Detail & Related papers (2020-08-05T07:49:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.