TrojanForge: Generating Adversarial Hardware Trojan Examples Using Reinforcement Learning (2405.15184v3)
Abstract: The Hardware Trojan (HT) problem can be thought of as a continuous game between attackers and defenders, each striving to outsmart the other by leveraging any available means for an advantage. Machine Learning (ML) has recently played a key role in advancing HT research. Various novel techniques, such as Reinforcement Learning (RL) and Graph Neural Networks (GNNs), have shown HT insertion and detection capabilities. HT insertion with ML techniques, specifically, has seen a spike in research activity due to the shortcomings of conventional HT benchmarks and the inherent human design bias that occurs when we create them. This work continues this innovation by presenting a tool called TrojanForge, capable of generating HT adversarial examples that defeat HT detectors; demonstrating the capabilities of GAN-like adversarial tools for automatic HT insertion. We introduce an RL environment where the RL insertion agent interacts with HT detectors in an insertion-detection loop where the agent collects rewards based on its success in bypassing HT detectors. Our results show that this process helps inserted HTs evade various HT detectors, achieving high attack success percentages. This tool provides insight into why HT insertion fails in some instances and how we can leverage this knowledge in defense.
- Swarup Bhunia and M Tehranipoor. 2018. The hardware trojan war. Springer.
- An automated configurable Trojan insertion framework for dynamic trust benchmarks. In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1598–1603.
- ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 1275–1289.
- DETERRENT: detecting trojans using reinforcement learning. In Proceedings of the 59th ACM/IEEE Design Automation Conference. 697–702.
- AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning. arXiv preprint arXiv:2402.13946 (2024).
- Exploring network structure, dynamics, and function using NetworkX. Technical Report. Los Alamos National Lab.(LANL), Los Alamos, NM (United States).
- R-HTDetector: Robust hardware-Trojan detection based on adversarial training. IEEE Trans. Comput. 72, 2 (2022), 333–345.
- Christian Krieg. 2023. Reflections on Trusting TrustHUB. In 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD). IEEE, 1–9.
- Generating adversarial examples for hardware-trojan detection at gate-level netlists. Journal of information processing 29 (2021), 236–246.
- Zhixin Pan and Prabhat Mishra. 2021. Automated test generation for hardware trojan detection using reinforcement learning. In Proceedings of the 26th Asia and South Pacific Design Automation Conference. 408–413.
- Shraddha Pandit et al. 2011. A comparative study on distance measuring approaches for clustering. Int. J. of res. in CS 2, 1 (2011), 29–31.
- Steve Povolny and Shivangee Trivedi. 2020. Model hacking ADAS to pave safer roads for autonomous vehicles. McAfee Blogs (2020).
- Stable-Baselines3: Reliable Reinforcement Learning Implementations. Journal of Machine Learning Research 22, 268 (2021), 1–8.
- On design vulnerability analysis and trust benchmarks development. In 2013 IEEE 31st international conference on computer design (ICCD). IEEE, 471–474.
- Vedika Saravanan et al. 2023. Revisiting Trojan Insertion Techniques for Post-Silicon Trojan Detection Evaluation. In ISVLSI 2023. IEEE, 1–6.
- Multi-Criteria Hardware Trojan Detection: A Reinforcement Learning Approach. In 2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS). 1093–1097.
- The Seeker’s Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection. arXiv preprint arXiv:2402.17918 (2024).
- Hardware trojan insertion using reinforcement learning. In Proceedings of the Great Lakes Symposium on VLSI 2022. 139–142.
- Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection. The Journal of Supercomputing (2024), 1–35.
- Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017). https://doi.org/10.48550/arXiv.1707.06347
- Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs. IET Computers & Digital Techniques 12, 6 (2018), 251–257.
- Benchmarking of hardware trojans and maliciously affected circuits. Journal of Hardware and Systems Security 1 (2017), 85–102.
- Global Value Chain Development Report 2023: Resilient And Sustainable Gvcs In Turbulent Times. (2023).
- Ten years of hardware Trojans: a survey from the attacker’s perspective. IET Computers & Digital Techniques 14, 6 (2020), 231–246.