Hardware IP Trust Validation: Learn (the Untrustworthy), and Verify

Tamzidul Hoque, Jonathan Cruz, Prabuddha Chakraborty, S. Bhunia
{"title":"Hardware IP Trust Validation: Learn (the Untrustworthy), and Verify","authors":"Tamzidul Hoque, Jonathan Cruz, Prabuddha Chakraborty, S. Bhunia","doi":"10.1109/TEST.2018.8624727","DOIUrl":null,"url":null,"abstract":"Increasing reliance on hardware Intellectual Property (IP) cores in modern system-on-chip (SoC) design flow, often obtained from untrusted vendors distributed across the globe, can significantly compromise the security of SoCs. While the design could be verified for a specified functionality using existing tools, it is extremely hard to verify its trustworthiness to guarantee that no hidden, and possibly malicious function exists in the form of a hardware Trojan. Conventional verification process and tools fail to verify the trust of a third-party IP, primarily due to the lack of trusted reference design or golden models. In this paper, for the first time to our knowledge, we introduce a systematic framework to apply machine learning based classification for hardware IP trust verification. A supervised classifier could be trained for identifying Trojan nets within a suspect IP, but the detection coverage and accuracy are extremely sensitive to the quality of training set available. Furthermore, reliance on a static training database limits the classifier’s ability in detecting new Trojans and facilitates adversarial learning. The proposed framework includes a Trojan insertion tool that dynamically generates a large number of diverse implementations of Trojan classes for creating a robust training set. It is significantly more difficult for an adversary to evade our classifier using known Trojan classes since the tool dynamically samples the entire Trojan population. To further improve the efficiency of the system, we combined three machine learning models into an average probability Voting Ensemble. Our results for two broad classes of Trojan show excellent classification accuracy of 99.69% and 99.88% with F-score of 86.69% and 88.37% for sequential and combinational Trojans, respectively.","PeriodicalId":219297,"journal":{"name":"2018 IEEE International Test Conference (ITC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Test Conference (ITC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TEST.2018.8624727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 26

Abstract

Increasing reliance on hardware Intellectual Property (IP) cores in modern system-on-chip (SoC) design flow, often obtained from untrusted vendors distributed across the globe, can significantly compromise the security of SoCs. While the design could be verified for a specified functionality using existing tools, it is extremely hard to verify its trustworthiness to guarantee that no hidden, and possibly malicious function exists in the form of a hardware Trojan. Conventional verification process and tools fail to verify the trust of a third-party IP, primarily due to the lack of trusted reference design or golden models. In this paper, for the first time to our knowledge, we introduce a systematic framework to apply machine learning based classification for hardware IP trust verification. A supervised classifier could be trained for identifying Trojan nets within a suspect IP, but the detection coverage and accuracy are extremely sensitive to the quality of training set available. Furthermore, reliance on a static training database limits the classifier’s ability in detecting new Trojans and facilitates adversarial learning. The proposed framework includes a Trojan insertion tool that dynamically generates a large number of diverse implementations of Trojan classes for creating a robust training set. It is significantly more difficult for an adversary to evade our classifier using known Trojan classes since the tool dynamically samples the entire Trojan population. To further improve the efficiency of the system, we combined three machine learning models into an average probability Voting Ensemble. Our results for two broad classes of Trojan show excellent classification accuracy of 99.69% and 99.88% with F-score of 86.69% and 88.37% for sequential and combinational Trojans, respectively.
硬件IP信任验证:学习(不可信的),并验证
在现代片上系统(SoC)设计流程中,对硬件知识产权(IP)内核的依赖日益增加,通常来自分布在全球各地的不受信任的供应商,这可能会严重损害SoC的安全性。虽然可以使用现有工具验证设计的特定功能,但要验证其可信度以保证没有隐藏的恶意功能以硬件木马的形式存在是非常困难的。传统的验证过程和工具无法验证第三方IP的信任,主要是由于缺乏可信的参考设计或黄金模型。在本文中,我们首次引入了一个系统的框架,将基于机器学习的分类应用于硬件IP信任验证。可以训练监督分类器来识别可疑IP中的特洛伊网络,但检测覆盖率和准确性对可用训练集的质量极为敏感。此外,对静态训练数据库的依赖限制了分类器检测新木马的能力,并促进了对抗性学习。提出的框架包括一个木马插入工具,该工具可以动态生成大量不同的木马类实现,以创建一个鲁棒训练集。攻击者使用已知的木马类来逃避我们的分类器要困难得多,因为该工具动态地对整个木马种群进行采样。为了进一步提高系统的效率,我们将三个机器学习模型组合成一个平均概率的投票集合。我们的结果显示,两大类特洛伊木马的分类准确率分别为99.69%和99.88%,序列木马和组合木马的f分分别为86.69%和88.37%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信