R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training

05/27/2022
by   Kento Hasegawa, et al.
0

Hardware Trojans (HTs) have become a serious problem, and extermination of them is strongly required for enhancing the security and safety of integrated circuits. An effective solution is to identify HTs at the gate level via machine learning techniques. However, machine learning has specific vulnerabilities, such as adversarial examples. In reality, it has been reported that adversarial modified HTs greatly degrade the performance of a machine learning-based HT detection method. Therefore, we propose a robust HT detection method using adversarial training (R-HTDetector). We formally describe the robustness of R-HTDetector in modifying HTs. Our work gives the world-first adversarial training for HT detection with theoretical backgrounds. We show through experiments with Trust-HUB benchmarks that R-HTDetector overcomes adversarial examples while maintaining its original accuracy.

READ FULL TEXT
research
02/16/2023

On the Effect of Adversarial Training Against Invariance-based Adversarial Examples

Adversarial examples are carefully crafted attack points that are suppos...
research
08/07/2020

Optimizing Information Loss Towards Robust Neural Networks

Neural Networks (NNs) are vulnerable to adversarial examples. Such input...
research
05/23/2022

Collaborative Adversarial Training

The vulnerability of deep neural networks (DNNs) to adversarial examples...
research
10/03/2016

cleverhans v2.0.0: an adversarial machine learning library

cleverhans is a software library that provides standardized reference im...
research
05/22/2019

Convergence and Margin of Adversarial Training on Separable Data

Adversarial training is a technique for training robust machine learning...
research
10/18/2018

A Training-based Identification Approach to VIN Adversarial Examples

With the rapid development of Artificial Intelligence (AI), the problem ...
research
10/16/2020

Learning Robust Algorithms for Online Allocation Problems Using Adversarial Training

We address the challenge of finding algorithms for online allocation (i....

Please sign up or login with your details

Forgot password? Click here to reset