基于机器学习的自动硬件木马攻击空间探索与基准测试框架

Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, S. Bhunia
{"title":"基于机器学习的自动硬件木马攻击空间探索与基准测试框架","authors":"Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, S. Bhunia","doi":"10.1109/AsianHOST56390.2022.10022234","DOIUrl":null,"url":null,"abstract":"Due to the current horizontal business model that promotes increasing reliance on untrusted third-party Intellectual Properties (IPs), Computer-Aided-Design (CAD) tools, and design facilities, hidden malicious functionalities, also known as hardware Trojan attacks, have become a serious threat to the semiconductor industry. Development of effective countermeasures against hardware Trojan attacks require: (1) fast and reliable exploration of the viable Trojan attack space for a given design and (2) a suite of high-quality Trojan-inserted benchmarks that meet specific standards. The latter has become essential for the development and evaluation of design/verification solutions to achieve quantifiable assurance against Trojan attacks. While existing static benchmarks provide a baseline for comparing different countermeasures, they only enumerate a limited number of hand-crafted Trojans from the complete Trojan design space. To accomplish these dual objectives, in this paper, we present MIMIC, a novel machine learning guided framework for automatic Trojan insertion, which can create a large and targeted population of valid Trojans for a given design by mimicking the properties of a small set of known Trojans. While there exist tools to automatically insert Trojan instances using fixed Trojan templates, they cannot analyze known Trojan attacks for creating new instances that accurately capture the threat model. MIMIC works in two major steps: (1) it analyzes structural and functional features of existing Trojan populations in a multi-dimensional space to train machine learning models and generate a large number of “virtual Trojans” of the given design, (2) next, it binds them into the design by matching their functional/structural properties with suitable nets of the internal logic structure. We have developed a complete tool flow for MIMIC, evaluated the framework, and quantified its effectiveness to demonstrate highly promising results.","PeriodicalId":207435,"journal":{"name":"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Machine Learning Based Automatic Hardware Trojan Attack Space Exploration and Benchmarking Framework\",\"authors\":\"Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, S. Bhunia\",\"doi\":\"10.1109/AsianHOST56390.2022.10022234\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the current horizontal business model that promotes increasing reliance on untrusted third-party Intellectual Properties (IPs), Computer-Aided-Design (CAD) tools, and design facilities, hidden malicious functionalities, also known as hardware Trojan attacks, have become a serious threat to the semiconductor industry. Development of effective countermeasures against hardware Trojan attacks require: (1) fast and reliable exploration of the viable Trojan attack space for a given design and (2) a suite of high-quality Trojan-inserted benchmarks that meet specific standards. The latter has become essential for the development and evaluation of design/verification solutions to achieve quantifiable assurance against Trojan attacks. While existing static benchmarks provide a baseline for comparing different countermeasures, they only enumerate a limited number of hand-crafted Trojans from the complete Trojan design space. To accomplish these dual objectives, in this paper, we present MIMIC, a novel machine learning guided framework for automatic Trojan insertion, which can create a large and targeted population of valid Trojans for a given design by mimicking the properties of a small set of known Trojans. While there exist tools to automatically insert Trojan instances using fixed Trojan templates, they cannot analyze known Trojan attacks for creating new instances that accurately capture the threat model. MIMIC works in two major steps: (1) it analyzes structural and functional features of existing Trojan populations in a multi-dimensional space to train machine learning models and generate a large number of “virtual Trojans” of the given design, (2) next, it binds them into the design by matching their functional/structural properties with suitable nets of the internal logic structure. We have developed a complete tool flow for MIMIC, evaluated the framework, and quantified its effectiveness to demonstrate highly promising results.\",\"PeriodicalId\":207435,\"journal\":{\"name\":\"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsianHOST56390.2022.10022234\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsianHOST56390.2022.10022234","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

由于当前的横向业务模式促进了对不可信的第三方知识产权(ip)、计算机辅助设计(CAD)工具和设计设施的日益依赖,隐藏的恶意功能(也称为硬件特洛伊木马攻击)已成为半导体行业的严重威胁。开发针对硬件木马攻击的有效对策需要:(1)对给定设计的可行木马攻击空间进行快速可靠的探索;(2)一套符合特定标准的高质量木马插入基准。后者对于设计/验证解决方案的开发和评估至关重要,以实现对特洛伊木马攻击的量化保证。虽然现有的静态基准测试为比较不同的对策提供了基准,但它们仅从完整的木马设计空间中枚举有限数量的手工制作的木马。虽然已有工具可以使用固定的木马模板自动插入木马实例,但它们无法分析已知的木马攻击,从而创建准确捕获威胁模型的新实例。MIMIC的工作分为两个主要步骤:(1)分析多维空间中现有木马种群的结构和功能特征,训练机器学习模型,生成大量给定设计的“虚拟木马”;(2)接下来,通过将它们的功能/结构属性与内部逻辑结构的合适网络相匹配,将它们绑定到设计中。我们已经为MIMIC开发了一个完整的工具流程,评估了框架,并量化了它的有效性,以证明非常有希望的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Machine Learning Based Automatic Hardware Trojan Attack Space Exploration and Benchmarking Framework
Due to the current horizontal business model that promotes increasing reliance on untrusted third-party Intellectual Properties (IPs), Computer-Aided-Design (CAD) tools, and design facilities, hidden malicious functionalities, also known as hardware Trojan attacks, have become a serious threat to the semiconductor industry. Development of effective countermeasures against hardware Trojan attacks require: (1) fast and reliable exploration of the viable Trojan attack space for a given design and (2) a suite of high-quality Trojan-inserted benchmarks that meet specific standards. The latter has become essential for the development and evaluation of design/verification solutions to achieve quantifiable assurance against Trojan attacks. While existing static benchmarks provide a baseline for comparing different countermeasures, they only enumerate a limited number of hand-crafted Trojans from the complete Trojan design space. To accomplish these dual objectives, in this paper, we present MIMIC, a novel machine learning guided framework for automatic Trojan insertion, which can create a large and targeted population of valid Trojans for a given design by mimicking the properties of a small set of known Trojans. While there exist tools to automatically insert Trojan instances using fixed Trojan templates, they cannot analyze known Trojan attacks for creating new instances that accurately capture the threat model. MIMIC works in two major steps: (1) it analyzes structural and functional features of existing Trojan populations in a multi-dimensional space to train machine learning models and generate a large number of “virtual Trojans” of the given design, (2) next, it binds them into the design by matching their functional/structural properties with suitable nets of the internal logic structure. We have developed a complete tool flow for MIMIC, evaluated the framework, and quantified its effectiveness to demonstrate highly promising results.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信