Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists
نویسندگان
چکیده
Recently, the great demand for integrated circuits (ICs) drives third parties to be involved in IC design and manufacturing steps. At same time, threat of injecting a malicious circuit, called hardware Trojan, by has been increasing. Machine learning is one powerful solutions detecting Trojans. However, weakness such machine-learning-based classification method against adversarial examples (AEs) reported, which causes misclassification adding perturbation input samples. This paper firstly proposes framework generating hardware-Trojan detection at gate-level netlists utilizing neural networks. The proposed replaces Trojan with logically equivalent ones, makes it difficult detect them. Secondly, we propose Trojan-net concealment degree (TCD) modification evaluating value (MEV) as measures amount modifications. Finally, based on MEV, pick up patterns apply detection. experimental results using benchmarks demonstrate that successfully decreases true positive rate (TPR) maximum 30.15 points.
منابع مشابه
Generating Natural Adversarial Examples
Due to their complex nature, it is hard to characterize the ways in which machine learning models can misbehave or be exploited when deployed. Recent work on adversarial examples, i.e. inputs with minor perturbations that result in substantially different model predictions, is helpful in evaluating the robustness of these models by exposing the adversarial scenarios where they fail. However, th...
متن کاملGenerating Adversarial Examples with Adversarial Networks
Deep neural networks (DNNs) have been found to be vulnerable to adversarial examples resulting from adding small-magnitude perturbations to inputs. Such adversarial examples can mislead DNNs to produce adversary-selected results. Different attack strategies have been proposed to generate adversarial examples, but how to produce them with high perceptual quality and more efficiently requires mor...
متن کاملFormal Methods for Reverse Engineering Gate-Level Netlists
Components An abstract component α is a triple (I, O,S), where I and O are sets of input and output signals, respectively, and S is a formal specification defining allowed input-output behavior of the component. An instance of an abstract component α is any circuit or netlist that satisfies the specification S of α. We illustrate the notion of an abstract component using an example. Example 2. ...
متن کاملAdversarial Examples for Malware Detection
Machine learning models are known to lack robustness against inputs crafted by an adversary. Such adversarial examples can, for instance, be derived from regular inputs by introducing minor—yet carefully selected—perturbations. In this work, we expand on existing adversarial example crafting algorithms to construct a highly-effective attack that uses adversarial examples against malware detecti...
متن کاملSystem-level protection and hardware Trojan detection using weighted voting☆
The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during the design process. Recent research is performed to detect Trojans embedded at manufacturing time by comparing the suspected chip with a golden c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of information processing
سال: 2021
ISSN: ['0387-6101']
DOI: https://doi.org/10.2197/ipsjjip.29.236