skip to main content
10.1145/3670474.3685959acmconferencesArticle/Chapter ViewAbstractPublication PagesmlcadConference Proceedingsconference-collections
research-article
Open access

TrojanForge: Generating Adversarial Hardware Trojan Examples Using Reinforcement Learning

Published: 09 September 2024 Publication History

Abstract

The Hardware Trojan (HT) problem can be thought of as a continuous game between attackers and defenders, each striving to outsmart the other by leveraging any available means for an advantage. Machine Learning (ML) has recently played a key role in advancing HT research. Various novel techniques, such as Reinforcement Learning (RL) and Graph Neural Networks (GNNs), have shown HT insertion and detection capabilities. HT insertion with ML techniques, specifically, has seen a spike in research activity due to the shortcomings of conventional HT benchmarks and the inherent human design bias that occurs when we create them. This work continues this innovation by presenting a tool called "TrojanForge", capable of generating HT adversarial examples that defeat HT detectors; demonstrating the capabilities of GAN-like adversarial tools for automatic HT insertion. We introduce an RL environment where the RL insertion agent interacts with HT detectors in an insertion-detection loop where the agent collects rewards based on its success in bypassing HT detectors. Our results show that this process helps inserted HTs evade various HT detectors, achieving high attack success percentages. This tool provides insight into why HT insertion fails in some instances and how we can leverage this knowledge in defense.

References

[1]
[n. d.]. GitHub -TrojanForge-Adversarial-Hardware-Trojan-Examples: Hardware Trojan Benchmark --- github.com. https://github.com/amin-sarihi/TrojanForge-Adversarial-Hardware-Trojan-Examples. [Accessed 06-08-2024].
[2]
[n. d.]. ISCAS High-Level Models. https://web.eecs.umich.edu/~jhayes/iscas.restore/benchmark.html. Accessed: 2023-11-07.
[3]
Swarup Bhunia and M Tehranipoor. 2018. The hardware trojan war. Springer.
[4]
Jonathan Cruz, Yuanwen Huang, Prabhat Mishra, and Swarup Bhunia. 2018. An automated configurable Trojan insertion framework for dynamic trust benchmarks. In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1598--1603.
[5]
Vasudev Gohil, Hao Guo, Satwik Patnaik, and Jeyavijayan Rajendran. 2022. ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 1275--1289.
[6]
Vasudev Gohil, Satwik Patnaik, Hao Guo, Dileep Kalathil, and Jeyavijayan Rajendran. 2022. DETERRENT: detecting trojans using reinforcement learning. In Proceedings of the 59th ACM/IEEE Design Automation Conference. 697--702.
[7]
Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, and Jeyavijayan Rajendran. 2024. AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning. arXiv preprint arXiv:2402.13946 (2024).
[8]
Aric Hagberg, Pieter Swart, and Daniel S Chult. 2008. Exploring network structure, dynamics, and function using NetworkX. Technical Report. Los Alamos National Lab.(LANL), Los Alamos, NM (United States).
[9]
Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, and Nozomu Togawa. 2022. R-HTDetector: Robust hardware-Trojan detection based on adversarial training. IEEE Trans. Comput. 72, 2 (2022), 333--345.
[10]
Christian Krieg. 2023. Reflections on Trusting TrustHUB. In 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD). IEEE, 1--9.
[11]
Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, and Nozomu Togawa. 2021. Generating adversarial examples for hardware-trojan detection at gate-level netlists. Journal of information processing 29 (2021), 236--246.
[12]
Zhixin Pan and Prabhat Mishra. 2021. Automated test generation for hardware trojan detection using reinforcement learning. In Proceedings of the 26th Asia and South Pacific Design Automation Conference. 408--413.
[13]
Shraddha Pandit et al. 2011. A comparative study on distance measuring approaches for clustering. Int. J. of res. in CS 2, 1 (2011), 29--31.
[14]
Antonin Raffin, Ashley Hill, Adam Gleave, Anssi Kanervisto, Maximilian Ernestus, and Noah Dormann. 2021. Stable-Baselines3: Reliable Reinforcement Learning Implementations. Journal of Machine Learning Research 22, 268 (2021), 1--8.
[15]
Hassan Salmani, Mohammad Tehranipoor, and Ramesh Karri. 2013. On design vulnerability analysis and trust benchmarks development. In 2013 IEEE 31st international conference on computer design (ICCD). IEEE, 471--474.
[16]
Vedika Saravanan et al. 2023. Revisiting Trojan Insertion Techniques for Post-Silicon Trojan Detection Evaluation. In ISVLSI 2023. IEEE, 1--6.
[17]
Amin Sarihi, Peter Jamieson, Ahmad Patooghy, and Abdel-Hameed A. Badawy. 2023. Multi-Criteria Hardware Trojan Detection: A Reinforcement Learning Approach. In 2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS). 1093--1097.
[18]
Amin Sarihi, Ahmad Patooghy, Abdel-Hameed A Badawy, and Peter Jamieson. 2024. The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection. arXiv preprint arXiv:2402.17918 (2024).
[19]
Amin Sarihi, Ahmad Patooghy, Peter Jamieson, and Abdel-Hameed A Badawy. 2022. Hardware trojan insertion using reinforcement learning. In Proceedings of the Great Lakes Symposium on VLSI 2022. 139--142.
[20]
Amin Sarihi, Ahmad Patooghy, Peter Jamieson, and Abdel-Hameed A Badawy. 2024. Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection. The Journal of Supercomputing (2024), 1--35.
[21]
John Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov. 2017. Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017). https://doi.org/10.48550/arXiv.1707.06347
[22]
Seyed Mohammad Sebt, Ahmad Patooghy, Hakem Beitollahi, and Michel Kinsy. 2018. Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs. IET Computers & Digital Techniques 12, 6 (2018), 251--257.
[23]
Bicky Shakya, Tony He, Hassan Salmani, Domenic Forte, Swarup Bhunia, and Mark Tehranipoor. 2017. Benchmarking of hardware trojans and maliciously affected circuits. Journal of Hardware and Systems Security 1 (2017), 85--102.
[24]
Yuqing Xing, Ran Wang, and David Dollar. 2023. Global Value Chain Development Report 2023: Resilient And Sustainable Gvcs In Turbulent Times. (2023).
[25]
Mingfu Xue, Chongyan Gu, Weiqiang Liu, Shichao Yu, and Máire O'Neill. 2020. Ten years of hardware Trojans: a survey from the attacker's perspective. IET Computers & Digital Techniques 14, 6 (2020), 231--246.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MLCAD '24: Proceedings of the 2024 ACM/IEEE International Symposium on Machine Learning for CAD
September 2024
321 pages
ISBN:9798400706998
DOI:10.1145/3670474
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 September 2024

Check for updates

Author Tags

  1. Adversarial Examples
  2. Hardware Security
  3. Hardware Trojan
  4. Reinforcement Learning

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

MLCAD '24
Sponsor:

Acceptance Rates

MLCAD '24 Paper Acceptance Rate 35 of 83 submissions, 42%;
Overall Acceptance Rate 35 of 83 submissions, 42%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 174
    Total Downloads
  • Downloads (Last 12 months)174
  • Downloads (Last 6 weeks)42
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media