Abstract
Machine Learning (ML) has increasingly found its place in a repertoire of tools used in most domains, from speech recognition to self-driving cars. One example of this growth is the prevalence of this technology in hardware security and its various sub-fields. Chapter 10 presents a machine learning survey on hardware security, particularly in two sub-fields: Trojan detection and side-channel analysis (SCA). This chapter evaluates a variety of works, which all use machine learning techniques to augment various hardware security frameworks or even create new ones entirely. The survey consists of works that seek to analyze the beneficial effects of machine learning better, infer new relationships between side-channel measurements, and extract sensitive information. The other works use machine learning to develop real-time hardware Trojan detection frameworks on a many-core platform, which have been rarely investigated in prior works. We express here the major findings of these five works and how they are relevant in the larger scope of the hardware security domain. The implementation strategies and their results are investigated. However, Chap. 10 does not investigate other sub-fields of hardware security where machine learning is deployed for fault injection techniques, verification, system-level PCB attacks, etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Azhagan, D. Mehta, H. Lu, S. Agrawal, P. Chawla, M. Tehranipoor, D. Woodard, N. Asadi, A review on automatic bill of material generation and visual inspection on pcbs, in ISTFA 2019: Conference Proceedings from the 45th International Symposium for Testing and Failure Analysis, ISTFA (2019), pp. 256–265
R.S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, MERO: A statistical approach for hardware Trojan detection, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, Heidelberg, 2009), pp. 396–410
T.S. Furey, N. Cristianini, N. Duffy, D.W. Bednarski, M. Schummer, D. Haussler, Support vector machine classification and validation of cancer tissue samples using microarray expression data. Bioinformatics 16(10), 906–914 (2000)
I. Goodfellow, Y. Bengio, A. Courville, Deep Learning (MIT Press, 2016)
L. Goubin, A. Martinelli, Protecting AES with Shamir’s secret sharing scheme, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, Heidelberg, 2011), pp. 79–94
T. Hoque, J. Cruz, P. Chakraborty, S. Bhunia, Hardware IP trust validation: Learn (the untrustworthy), and verify, in 2018 IEEE International Test Conference (ITC) (IEEE, 2018), pp. 1–10
G. Hospodar, B. Gierlichs, E. De Mulder, I. Verbauwhede, J. Vandewalle, Machine learning in side-channel analysis: a first study. J. Cryptogr. Eng. 1(4), 293 (2011)
ISCAS89 Sequential Benchmark Circuits [n.d.], https://filebox.ece.vt.edu/-mhsiao/iscas89.html
A. Kulkarni, Y. Pino, T. Mohsenin, Adaptive real-time Trojan detection framework through machine learning, in 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (2016), pp. 120–123. https://doi.org/10.1109/HST.2016.7495568
A. Kulkarni, Y. Pino, T. Mohsenin, Adaptive real-time trojan detection framework through machine learning, in 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (IEEE, 2016), pp. 120–123
A. Kulkarni, Y. Pino, T. Mohsenin, SVM-based real-time hardware Trojan detection for many-core platform, in 2016 17th International Symposium on Quality Electronic Design (ISQED) (2016)
T. Kurihara, K. Hasegawa, N. Togawa, Evaluation on hardware-Trojan detection at gate-level IP cores utilizing machine learning methods, in 2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS) (IEEE, 2020), pp. 1–4
L. Lerman, R. Poussier, G. Bontempi, O. Markowitch, F.-X. Standaert, Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis), in International Workshop on Constructive Side-Channel Analysis and Secure Design (Springer, Cham, 2015), pp. 20–33
Y. Lyu, P. Mishra, Automated trigger activation by repeated maximal clique sampling, in 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC) (IEEE, 2020), pp. 482–487
H. Maghrebi, Assessment of common side channel countermeasures with respect to deep learning based profiled attacks, in 2019 31st International Conference on Microelectronics (ICM) (2019)
H. Maghrebi, Assessment of common side channel countermeasures with respect to deep learning based profiled attacks, in 2019 31st International Conference on Microelectronics (ICM) (IEEE, 2019), pp. 126–129
T. Moos, F. Wegener, A. Moradi, DL-LA: Deep learning leakage assessment: A modern roadmap for SCA evaluations. Cryptology ePrint Archive (2019)
A. Moradi, B. Richter, T. Schneider, F.-X. Standaert, Leakage detection with the x2-test. IACR Trans. Cryptogr. Hardw. Embed. Syst., 209–237 (2018)
N. Mukhtar, M. Mehrabi, Y. Kong, A. Anjum, Machine-learning-based side-channel evaluation of elliptic-curve cryptographic FPGA processor. Applied Sciences 9(1), 64 (2018)
N. Mukhtar, M.A. Mehrabi, Y. Kong, A. Anjum, Machine-learning-based side-channel evaluation of elliptic-curve cryptographic FPGA processor. Applied Sciences 9(1), 64 (2019)
Z. Pan, J. Sheldon, P. Mishra, Test generation using reinforcement learning for delay-based side-channel analysis, in 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD) (IEEE, 2020), pp. 1–7
Z. Pan, P. Mishra, Automated test generation for hardware trojan detection using reinforcement learning, in Proceedings of the 26th Asia and South Pacific Design Automation Conference (2021), pp. 408–413
L.E. Peterson, K-nearest neighbor. Scholarpedia 4(2), 1883 (2009)
J.R. Quinlan, Induction of decision trees. Machine Learning 1(1), 81–106 (1986)
M.T. Rahman, N. Asadizanjani, Backside security assessment of modern socs, in 2019 20th International Workshop on Microprocessor/SoC Test, Security and Verification (MTV) (IEEE, 2019), pp. 18–24
F. Regazzoni, S. Bhasin, A.A. Pour, I. Alshaer, F. Aydin, A. Aysu, …, V. Yli-Mäyry, Machine learning and hardware security: Challenges and opportunities-invited talk, in 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD) (IEEE, 2020, November), pp. 1–6
H. Salmani, COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans. Inf. Forensics Secur. 12(2), 338–350 (2016)
G.A.F. Seber, A.J. Lee, Linear Regression Analysis, vol. 329 (Wiley, 2012)
A. Shamir, How to share a secret. Commun. ACM 22(11), 612–613 (1979)
A. Shostack, Threat Modeling: Designing for Security (Wiley, 2014)
A. Stern, D. Mehta, S. Tajik, F. Farahmandi, M. Tehranipoor, SPARTA: A laser probing approach for Trojan detection, in 2020 IEEE International Test Conference (ITC) (IEEE, 2020), pp. 1–10
M. Tehranipoor, trust-hub.org, Trust. [Online]. Available: https://trust-hub.org/#/benchmarks/chip-level-trojan. [Accessed: 02-May-2021]
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Farahmandi, F., Rahman, M.S., Rajendran, S.R., Tehranipoor, M. (2023). CAD for Machine Learning in Hardware Security. In: CAD for Hardware Security . Springer, Cham. https://doi.org/10.1007/978-3-031-26896-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-031-26896-0_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-26895-3
Online ISBN: 978-3-031-26896-0
eBook Packages: EngineeringEngineering (R0)