Uncertainty-Aware Hardware Trojan Detection Using Multimodal Deep Learning (2401.09479v2)
Abstract: The risk of hardware Trojans being inserted at various stages of chip production has increased in a zero-trust fabless era. To counter this, various machine learning solutions have been developed for the detection of hardware Trojans. While most of the focus has been on either a statistical or deep learning approach, the limited number of Trojan-infected benchmarks affects the detection accuracy and restricts the possibility of detecting zero-day Trojans. To close the gap, we first employ generative adversarial networks to amplify our data in two alternative representation modalities, a graph and a tabular, ensuring that the dataset is distributed in a representative manner. Further, we propose a multimodal deep learning approach to detect hardware Trojans and evaluate the results from both early fusion and late fusion strategies. We also estimate the uncertainty quantification metrics of each prediction for risk-aware decision-making. The outcomes not only confirms the efficacy of our proposed hardware Trojan detection method but also opens a new door for future studies employing multimodality and uncertainty quantification to address other hardware security challenges.
- H. Salmani, “Hardware trojan attacks and countermeasures,” in Fundamentals of IP and SoC Security: Design, Verification, and Debug, S. Bhunia, S. Ray, and S. Sur-Kolay, Eds. Springer, 2017, pp. 247–276.
- S. Bhasin and F. Regazzoni, “A survey on hardware trojan detection techniques,” in IEEE International Symposium on Circuits and Systems (ISCAS), 2015, pp. 2021–2024.
- A. Jain, Z. Zhou, and U. Guin, “Survey of recent developments for hardware trojan detection,” in IEEE International Symposium on Circuits and Systems (ISCAS), 2021, pp. 1–5.
- H. Salmani, “Cotd: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 338–350, 2017.
- K. I. Gubbi, B. Saber Latibari, A. Srikanth, T. Sheaves, S. A. Beheshti-Shirazi, S. M. PD, S. Rafatirad, A. Sasan, H. Homayoun, and S. Salehi, “Hardware trojan detection using machine learning: A tutorial,” ACM Transactions on Embedded Computing Systems, vol. 22, no. 3, pp. 1–26, 2023.
- Z. Huang, Q. Wang, Y. Chen, and X. Jiang, “A survey on machine learning against hardware trojan attacks: Recent advances and challenges,” IEEE Access, vol. 8, pp. 10 796–10 826, 2020.
- K. G. Liakos, G. K. Georgakilas, S. Moustakidis, P. Karlsson, and F. C. Plessas, “Machine learning for hardware trojan detection: A review,” in Panhellenic Conference on Electronics & Telecommunications (PACET), 2019, pp. 1–6.
- D. Koblah, R. Acharya, D. Capecci, O. Dizon-Paradis, S. Tajik, F. Ganji, D. Woodard, and D. Forte, “A survey and perspective on artificial intelligence for security-aware electronic design automation,” ACM Transactions on Design Automation of Electronic Systems, vol. 28, no. 2, pp. 1–57, 2023.
- T. Ç. Köylü, C. R. W. Reinbrecht, A. Gebregiorgis, S. Hamdioui, and M. Taouil, “A survey on machine learning in hardware security,” ACM Journal on Emerging Technologies in Computing Systems, vol. 19, no. 2, article 18, 2023.
- M. T. West, S.-L. Tsang, J. S. Low, C. D. Hill, C. Leckie, L. C. Hollenberg, S. M. Erfani, and M. Usman, “Towards quantum enhanced adversarial robustness in machine learning,” Nature Machine Intelligence, pp. 1–9, 2023.
- X. Li, H. Xiong, X. Li, X. Wu, X. Zhang, J. Liu, J. Bian, and D. Dou, “Interpretable deep learning: Interpretation, interpretability, trustworthiness, and beyond,” Knowledge and Information Systems, vol. 64, no. 12, pp. 3197–3234, 2022.
- R. Caruana, S. Lundberg, M. T. Ribeiro, H. Nori, and S. Jenkins, “Intelligible and explainable machine learning: Best practices and practical challenges,” in Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining, 2020, pp. 3511–3512.
- C. Bao, D. Forte, and A. Srivastava, “On application of one-class svm to reverse engineering-based hardware trojan detection,” in 5th International Symposium on Quality Electronic Design (ISQED), 2014, pp. 47–54.
- K. Hasegawa, M. Yanagisawa, and N. Togawa, “A hardware-trojan classification method using machine learning at gate-level netlists based on trojan features,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 100, no. 7, pp. 1427–1438, 2017.
- C. Dong, J. Chen, W. Guo, and J. Zou, “A machine-learning-based hardware-trojan detection approach for chips in the internet of things,” International Journal of Distributed Sensor Networks, vol. 15, no. 12, 2019.
- K. Hasegawa, M. Yanagisawa, and N. Togawa, “Trojan-feature extraction at gate-level netlists and its application to hardware-trojan detection using random forest classifier,” in IEEE International Symposium on Circuits and Systems (ISCAS), 2017, pp. 1–4.
- M. Ashok, M. J. Turner, R. L. Walsworth, E. V. Levine, and A. P. Chandrakasan, “Hardware trojan detection using unsupervised deep learning on quantum diamond microscope magnetic field images,” ACM Journal on Emerging Technologies in Computing Systems (JETC), vol. 18, no. 4, pp. 1–25, 2022.
- N. Srivastava and R. R. Salakhutdinov, “Multimodal learning with deep boltzmann machines,” Journal of Machine Learning Research, vol. 15, no. 84, pp. 2949–2980, 2014.
- H. Wang, J. Zhang, Y. Chen, C. Ma, J. Avery, L. Hull, and G. Carneiro, “Uncertainty-aware multi-modal learning via cross-modal random network prediction,” in European Conference on Computer Vision (ECCV), 2022, pp. 200–217.
- U. Sarawgi, “Uncertainty-aware ensembling in multi-modal ai and its applications in digital health for neurodegenerative disorders,” Ph.D. dissertation, Massachusetts Institute of Technology, 2021.
- C. Almecija, A. Sharma, and N. Azizan, “Uncertainty-aware meta-learning for multimodal task distributions,” ArXiv preprint ArXiv:2210.01881, 2022.
- Y. Ektefaie, G. Dasoulas, A. Noori, M. Farhat, and M. Zitnik, “Multimodal learning with graphs,” Nature Machine Intelligence, vol. 5, no. 4, pp. 340–350, 2023.
- S. Kim, N. Lee, J. Lee, D. Hyun, and C. Park, “Heterogeneous graph learning for multi-modal medical data analysis,” in Proceedings of the AAAI Conference on Artificial Intelligence, vol. 37, no. 4, 2023, pp. 5141–5150.
- T. Nyiri and A. Kiss, “What can we learn from small data,” Infocommunications Journal, Special Issue on Applied Informatics, pp. 27–34, 2023.
- P. Xu, X. Ji, M. Li, and W. Lu, “Small data machine learning in materials science,” npj Computational Materials, vol. 9, no. 1, p. 42, 2023.
- A. Ghamisi, T. Charter, L. Ji, M. Rivard, G. Lund, and H. Najjaran, “Anomaly detection in automated fibre placement: Learning with data limitations,” ArXiv preprint ArXiv:2307.07893, 2023.
- S.-Y. Yu, R. Yasaei, Q. Zhou, T. Nguyen, and M. A. A. Faruque, “Hw2vec: A graph learning tool for automating hardware security,” arXiv preprint arXiv:2107.12328, 2021. [Online]. Available: https://dx.doi.org/10.21227/j1vv-hw18
- H. Salmani, M. Tehranipoor, S. Sutikno, and F. Wijitrisnanto, “Trust-hub trojan benchmark for hardware trojan detection model creation using machine learning,” 2022. [Online]. Available: https://dx.doi.org/10.21227/px6s-sm21
- J. Ngiam, A. Khosla, M. Kim, J. Nam, H. Lee, and A. Y. Ng, “Multimodal deep learning,” in Proceedings International Conference on Machine Learning (ICML), 2011, pp. 689–696.
- V. H. Trong, Y. Gwang-hyun, D. T. Vu, and K. Jin-young, “Late fusion of multimodal deep neural networks for weeds classification,” Computers and Electronics in Agriculture, vol. 175, p. 105506, 2020.
- T. M. Nguyen, T. Nguyen, T. M. Le, and T. Tran, “Gefa: early fusion approach in drug-target affinity prediction,” IEEE/ACM transactions on computational biology and bioinformatics, vol. 19, no. 2, pp. 718–728, 2021.
- Y. Ovadia, E. Fertig, J. Ren, Z. Nado, D. Sculley, S. Nowozin, J. Dillon, B. Lakshminarayanan, and J. Snoek, “Can you trust your model’s uncertainty? evaluating predictive uncertainty under dataset shift,” in Proceedings of the 33rd International Conference on Neural Information Processing Systems, 2019, pp. 14 003–14 014.
- G. Shafer and V. Vovk, “A tutorial on conformal prediction.” Journal of Machine Learning Research, vol. 9, no. 3, pp. 371–421, 2008.
- T. Löfström, H. Boström, H. Linusson, and U. Johansson, “Bias reduction through conditional conformal prediction,” Intelligent Data Analysis, vol. 19, no. 6, pp. 1355–1375, 2015.
- V. N. Balasubramanian, S. Chakraborty, and S. Panchanathan, “Conformal predictions for information fusion: A comparative study of p-value combination methods,” Annals of Mathematics and Artificial Intelligence, vol. 74, no. 1-2, pp. 45–65, 2015.
- H. Boström, U. Johansson, and T. Löfström, “Mondrian conformal predictive distributions,” in Symposium on Conformal and Probabilistic Prediction and Applications, 2021, pp. 24–38.
- N. Jaques, S. Taylor, A. Sano, and R. Picard, “Multimodal autoencoder: A deep learning approach to filling in missing sensor data and enabling better mood prediction,” in IEEE International Conference on Affective Computing and Intelligent Interaction (ACII), 2017, pp. 202–208.
- A. Creswell, T. White, V. Dumoulin, K. Arulkumaran, B. Sengupta, and A. A. Bharath, “Generative adversarial networks: An overview,” IEEE signal processing magazine, vol. 35, no. 1, pp. 53–65, 2018.
- I. Gallo, A. Calefati, and S. Nawaz, “Multimodal classification fusion in real-world scenarios,” in IAPR International Conference on Document Analysis and Recognition (ICDAR), vol. 5, 2017, pp. 36–41.
- Rahul Vishwakarma (11 papers)
- Amin Rezaei (11 papers)