TY - JOUR
T1 - R-HTDetector
T2 - Robust Hardware-Trojan Detection Based on Adversarial Training
AU - Hasegawa, Kento
AU - Hidano, Seira
AU - Nozawa, Kohei
AU - Kiyomoto, Shinsaku
AU - Togawa, Nozomu
N1 - Publisher Copyright:
© 1968-2012 IEEE.
PY - 2023/2/1
Y1 - 2023/2/1
N2 - Hardware Trojans (HTs) have become a serious problem, and extermination of them is strongly required for enhancing the security and safety of integrated circuits. An effective solution is to identify HTs at the gate level via machine learning techniques. However, machine learning has specific vulnerabilities, such as adversarial examples. In reality, it has been reported that adversarial modified HTs greatly degrade the performance of a machine learning-based HT detection method. Therefore, we propose a robust HT detection method using adversarial training (R-HTDetector). We formally describe the robustness of R-HTDetector in modifying HTs. Our work gives the world-first adversarial training for HT detection with theoretical backgrounds. We show through experiments with Trust-HUB benchmarks that R-HTDetector overcomes adversarial examples while maintaining its original accuracy.
AB - Hardware Trojans (HTs) have become a serious problem, and extermination of them is strongly required for enhancing the security and safety of integrated circuits. An effective solution is to identify HTs at the gate level via machine learning techniques. However, machine learning has specific vulnerabilities, such as adversarial examples. In reality, it has been reported that adversarial modified HTs greatly degrade the performance of a machine learning-based HT detection method. Therefore, we propose a robust HT detection method using adversarial training (R-HTDetector). We formally describe the robustness of R-HTDetector in modifying HTs. Our work gives the world-first adversarial training for HT detection with theoretical backgrounds. We show through experiments with Trust-HUB benchmarks that R-HTDetector overcomes adversarial examples while maintaining its original accuracy.
KW - Adversarial examples
KW - adversarial training
KW - gate-level netlists
KW - hardware Trojans
KW - machine learning
UR - http://www.scopus.com/inward/record.url?scp=85142832955&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85142832955&partnerID=8YFLogxK
U2 - 10.1109/TC.2022.3222090
DO - 10.1109/TC.2022.3222090
M3 - Article
AN - SCOPUS:85142832955
SN - 0018-9340
VL - 72
SP - 333
EP - 345
JO - IEEE Transactions on Computers
JF - IEEE Transactions on Computers
IS - 2
ER -