TY - JOUR
T1 - Generating adversarial examples for hardware-trojan detection at gate-level netlists
AU - Nozawa, Kohei
AU - Hasegawa, Kento
AU - Hidano, Seira
AU - Kiyomoto, Shinsaku
AU - Hashimoto, Kazuo
AU - Togawa, Nozomu
N1 - Publisher Copyright:
© 2021 Information Processing Society of Japan.
PY - 2021
Y1 - 2021
N2 - Recently, the great demand for integrated circuits (ICs) drives third parties to be involved in IC design and manufacturing steps. At the same time, the threat of injecting a malicious circuit, called a hardware Trojan, by third parties has been increasing. Machine learning is one of the powerful solutions for detecting hardware Trojans. How-ever, a weakness of such a machine-learning-based classification method against adversarial examples (AEs) has been reported, which causes misclassification by adding perturbation in input samples. This paper firstly proposes a framework generating adversarial examples for hardware-Trojan detection at gate-level netlists utilizing neural networks. The proposed framework replaces hardware Trojan circuits with logically equivalent ones, and makes it difficult to detect them. Secondly, we propose a Trojan-net concealment degree (TCD) and a modification evaluating value (MEV) as measures of the amount of modifications. Finally, based on the MEV, we pick up adversarial modification patterns to apply to the circuits against hardware-Trojan detection. The experimental results using benchmarks demonstrate that the proposed framework successfully decreases the true positive rate (TPR) by a maximum of 30.15 points.
AB - Recently, the great demand for integrated circuits (ICs) drives third parties to be involved in IC design and manufacturing steps. At the same time, the threat of injecting a malicious circuit, called a hardware Trojan, by third parties has been increasing. Machine learning is one of the powerful solutions for detecting hardware Trojans. How-ever, a weakness of such a machine-learning-based classification method against adversarial examples (AEs) has been reported, which causes misclassification by adding perturbation in input samples. This paper firstly proposes a framework generating adversarial examples for hardware-Trojan detection at gate-level netlists utilizing neural networks. The proposed framework replaces hardware Trojan circuits with logically equivalent ones, and makes it difficult to detect them. Secondly, we propose a Trojan-net concealment degree (TCD) and a modification evaluating value (MEV) as measures of the amount of modifications. Finally, based on the MEV, we pick up adversarial modification patterns to apply to the circuits against hardware-Trojan detection. The experimental results using benchmarks demonstrate that the proposed framework successfully decreases the true positive rate (TPR) by a maximum of 30.15 points.
KW - Adversarial example
KW - Hardware Trojan
KW - Logic gate
KW - Machine learning
KW - Netlist
UR - http://www.scopus.com/inward/record.url?scp=85103677994&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85103677994&partnerID=8YFLogxK
U2 - 10.2197/IPSJJIP.29.236
DO - 10.2197/IPSJJIP.29.236
M3 - Article
AN - SCOPUS:85103677994
SN - 0387-5806
VL - 29
SP - 236
EP - 246
JO - Journal of information processing
JF - Journal of information processing
ER -