An Overview of Machine Learning Applications in Hardware Security

Basel Halak, Mohd Syafiq Mispan
{"title":"An Overview of Machine Learning Applications in Hardware Security","authors":"Basel Halak, Mohd Syafiq Mispan","doi":"10.1109/DTS55284.2022.9809857","DOIUrl":null,"url":null,"abstract":"this study explores the uses of machine learning (ML) in the field of hardware security, in particular, two applications areas are considered, namely, hardware Trojan (HT) and IC counterfeits. These examples demonstrate how ML algorithms can be employed as a defense mechanism to detect forged or tampered-with circuits. Our analysis shows that the ML detection accuracy still has not reached 100%. The selection and size of the feature vectors greatly affect the performance of the learning models, however, increasing the number of features or their size can lead to large overheads. Therefore, a thorough analysis is required to only select the appropriate- ate several relevant features that significantly contribute to the accuracy of ML models. The study also highlighted the need for a more robust deployment of ML algorithms to enhance their resilience to adversarial attacks.","PeriodicalId":290904,"journal":{"name":"2022 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DTS55284.2022.9809857","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

this study explores the uses of machine learning (ML) in the field of hardware security, in particular, two applications areas are considered, namely, hardware Trojan (HT) and IC counterfeits. These examples demonstrate how ML algorithms can be employed as a defense mechanism to detect forged or tampered-with circuits. Our analysis shows that the ML detection accuracy still has not reached 100%. The selection and size of the feature vectors greatly affect the performance of the learning models, however, increasing the number of features or their size can lead to large overheads. Therefore, a thorough analysis is required to only select the appropriate- ate several relevant features that significantly contribute to the accuracy of ML models. The study also highlighted the need for a more robust deployment of ML algorithms to enhance their resilience to adversarial attacks.
机器学习在硬件安全中的应用概述
本研究探讨了机器学习(ML)在硬件安全领域的应用,特别是考虑了两个应用领域,即硬件木马(HT)和IC假冒。这些例子展示了机器学习算法如何作为一种防御机制来检测伪造或篡改的电路。我们的分析表明,ML检测的准确率仍然没有达到100%。特征向量的选择和大小极大地影响了学习模型的性能,然而,增加特征的数量或它们的大小会导致很大的开销。因此,需要进行彻底的分析,只选择适当的几个相关特征,这些特征对ML模型的准确性有重要贡献。该研究还强调了更强大的机器学习算法部署的必要性,以增强其对对抗性攻击的抵御能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信