Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach

Amin Sarihi,Peter Jamieson,Ahmad Patooghy,Abdel-Hameed A. Badawy
2023-04-26
Abstract:Hardware Trojans (HTs) are undesired design or manufacturing modifications that can severely alter the security and functionality of digital integrated circuits. HTs can be inserted according to various design criteria, e.g., nets switching activity, observability, controllability, etc. However, to our knowledge, most HT detection methods are only based on a single criterion, i.e., nets switching activity. This paper proposes a multi-criteria reinforcement learning (RL) HT detection tool that features a tunable reward function for different HT detection scenarios. The tool allows for exploring existing detection strategies and can adapt new detection scenarios with minimal effort. We also propose a generic methodology for comparing HT detection methods fairly. Our preliminary results show an average of 84.2% successful HT detection in ISCAS-85 benchmark
Hardware Architecture,Cryptography and Security,Machine Learning
What problem does this paper attempt to address?
The paper primarily addresses the issue of Hardware Trojans (HTs) by proposing a new detection method. Hardware Trojans are malicious modifications inserted during the design or manufacturing process of integrated circuits, which can severely impact the security and functionality of digital integrated circuits. Traditional detection methods are usually based on a single criterion (such as network switching activity), which may not be sufficient to cover the various strategies that attackers might employ in the real world. To solve this problem, the paper proposes a multi-criteria reinforcement learning (RL) based hardware Trojan detection tool. This tool features an adjustable reward function that can be modified and retrained according to different detection scenarios. Specifically, the method utilizes RL algorithms to explore large-scale circuit designs and generate test vectors to identify Trojans in digital circuits. Additionally, the paper introduces a general approach to fairly compare the effectiveness of different hardware Trojan detection methods. This approach introduces a confidence value metric, which can help security engineers evaluate the strengths and weaknesses of different detectors based on the needs of specific applications. Experimental results show that in the ISCAS-85 benchmark tests, the proposed tool successfully detected an average of 84.2% of hardware Trojans. By comparing three different reward functions, it was found that one of them (labeled D2) provided the best detection rate in most cases, thereby achieving the highest confidence value. This indicates that the tool is most reliable in detecting hardware Trojans when using this reward function.