Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach

04/26/2023
by   Amin Sarihi, et al.
0

Hardware Trojans (HTs) are undesired design or manufacturing modifications that can severely alter the security and functionality of digital integrated circuits. HTs can be inserted according to various design criteria, e.g., nets switching activity, observability, controllability, etc. However, to our knowledge, most HT detection methods are only based on a single criterion, i.e., nets switching activity. This paper proposes a multi-criteria reinforcement learning (RL) HT detection tool that features a tunable reward function for different HT detection scenarios. The tool allows for exploring existing detection strategies and can adapt new detection scenarios with minimal effort. We also propose a generic methodology for comparing HT detection methods fairly. Our preliminary results show an average of 84.2 successful HT detection in ISCAS-85 benchmark

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/16/2023

Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection

Current Hardware Trojan (HT) detection techniques are mostly developed b...
research
04/09/2022

Hardware Trojan Insertion Using Reinforcement Learning

This paper utilizes Reinforcement Learning (RL) as a means to automate t...
research
03/29/2020

Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs

Offshoring the proprietary Intellectual property (IP) has recently incre...
research
07/03/2021

Examining average and discounted reward optimality criteria in reinforcement learning

In reinforcement learning (RL), the goal is to obtain an optimal policy,...
research
12/13/2021

A Benchmark for Low-Switching-Cost Reinforcement Learning

A ubiquitous requirement in many practical reinforcement learning (RL) a...
research
08/26/2022

DETERRENT: Detecting Trojans using Reinforcement Learning

Insertion of hardware Trojans (HTs) in integrated circuits is a pernicio...
research
08/26/2022

ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning

Stealthy hardware Trojans (HTs) inserted during the fabrication of integ...

Please sign up or login with your details

Forgot password? Click here to reset