{"title":"机器学习在硬件安全中的应用概述","authors":"Basel Halak, Mohd Syafiq Mispan","doi":"10.1109/DTS55284.2022.9809857","DOIUrl":null,"url":null,"abstract":"this study explores the uses of machine learning (ML) in the field of hardware security, in particular, two applications areas are considered, namely, hardware Trojan (HT) and IC counterfeits. These examples demonstrate how ML algorithms can be employed as a defense mechanism to detect forged or tampered-with circuits. Our analysis shows that the ML detection accuracy still has not reached 100%. The selection and size of the feature vectors greatly affect the performance of the learning models, however, increasing the number of features or their size can lead to large overheads. Therefore, a thorough analysis is required to only select the appropriate- ate several relevant features that significantly contribute to the accuracy of ML models. The study also highlighted the need for a more robust deployment of ML algorithms to enhance their resilience to adversarial attacks.","PeriodicalId":290904,"journal":{"name":"2022 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Overview of Machine Learning Applications in Hardware Security\",\"authors\":\"Basel Halak, Mohd Syafiq Mispan\",\"doi\":\"10.1109/DTS55284.2022.9809857\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"this study explores the uses of machine learning (ML) in the field of hardware security, in particular, two applications areas are considered, namely, hardware Trojan (HT) and IC counterfeits. These examples demonstrate how ML algorithms can be employed as a defense mechanism to detect forged or tampered-with circuits. Our analysis shows that the ML detection accuracy still has not reached 100%. The selection and size of the feature vectors greatly affect the performance of the learning models, however, increasing the number of features or their size can lead to large overheads. Therefore, a thorough analysis is required to only select the appropriate- ate several relevant features that significantly contribute to the accuracy of ML models. The study also highlighted the need for a more robust deployment of ML algorithms to enhance their resilience to adversarial attacks.\",\"PeriodicalId\":290904,\"journal\":{\"name\":\"2022 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DTS55284.2022.9809857\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DTS55284.2022.9809857","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Overview of Machine Learning Applications in Hardware Security
this study explores the uses of machine learning (ML) in the field of hardware security, in particular, two applications areas are considered, namely, hardware Trojan (HT) and IC counterfeits. These examples demonstrate how ML algorithms can be employed as a defense mechanism to detect forged or tampered-with circuits. Our analysis shows that the ML detection accuracy still has not reached 100%. The selection and size of the feature vectors greatly affect the performance of the learning models, however, increasing the number of features or their size can lead to large overheads. Therefore, a thorough analysis is required to only select the appropriate- ate several relevant features that significantly contribute to the accuracy of ML models. The study also highlighted the need for a more robust deployment of ML algorithms to enhance their resilience to adversarial attacks.