The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection

Amin Sarihi,Ahmad Patooghy,Abdel-Hameed A. Badawy,Peter Jamieson
2024-02-28
Abstract:This work focuses on advancing security research in the hardware design space by formally defining the realistic problem of Hardware Trojan (HT) detection. The goal is to model HT detection more closely to the real world, i.e., describing the problem as "The Seeker's Dilemma" (an extension of Hide&Seek on a graph), where a detecting agent is unaware of whether circuits are infected by HTs or not. Using this theoretical problem formulation, we create a benchmark that consists of a mixture of HT-free and HT-infected restructured circuits while preserving their original functionalities. The restructured circuits are randomly infected by HTs, causing a situation where the defender is uncertain if a circuit is infected or not. We believe that our innovative dataset will help the community better judge the detection quality of different methods by comparing their success rates in circuit classification. We use our developed benchmark to evaluate three state-of-the-art HT detection tools to show baseline results for this approach. We use Principal Component Analysis to assess the strength of our benchmark, where we observe that some restructured HT-infected circuits are mapped closely to HT-free circuits, leading to significant label misclassification by detectors.
Cryptography and Security,Hardware Architecture,Machine Learning
What problem does this paper attempt to address?
This paper attempts to solve the key problems in Hardware Trojan (HT) detection, that is, how to define and evaluate HT detection methods more in line with actual scenarios. Specifically: 1. **Formally define the HT detection problem**: This paper introduces a new theoretical framework - "The Seeker’s Dilemma", which formalizes the HT detection problem as a Hide&Seek game on a graph. In this game, the Seeker does not know whether the circuit has been implanted with HT, thus increasing the complexity and realism of detection. 2. **Create a more realistic benchmark set**: The paper proposes a new benchmark set (called Seeker1), which contains circuit instances that may or may not contain HT. This mixed setting makes the detection tool unable to know in advance whether the circuit is infected with HT, thus being closer to the real - life detection scenario. 3. **Evaluate existing detection tools**: Researchers evaluated three state - of - the - art HT detection tools using the newly proposed benchmark set to show the performance of these tools in the new environment and provide baseline results. 4. **Improve the evaluation method**: By introducing "The Seeker’s Dilemma", the paper also proposes a new evaluation process, aiming to update the traditional HT detection evaluation method to make it more in line with the requirements of practical applications. ### Formula Explanation To ensure the accuracy and readability of formulas, the following are the key formulas involved in the paper: - **Confidence Calculation Formula**: \[ \text{Conf. V al} = \frac{(1 - \text{FP})}{\left(\frac{1}{\alpha} + \text{FN}\right)} \] where \(\text{FP}\) represents the probability of false positives, \(\text{FN}\) represents the probability of false negatives, and \(\alpha\) is a parameter set by the user, representing the ratio of the unacceptability of false negatives to false positives. - **Complexity Calculation Formula**: \[ M \sum_{q = 2}^{M} \sum_{p = 0}^{q} \sum_{i = 1}^{N} \binom{r_i}{p} \times \binom{g_i}{q - p} \] where \(M\) is the maximum number of trigger inputs, \(N\) is the number of attack strategies, \(r_i\) and \(g_i\) are the numbers of rare nets and regular nets in the \(i\)-th strategy respectively, and \(\binom{r_i}{p}\) and \(\binom{g_i}{q - p}\) are the combination numbers of selecting trigger inputs from rare nets and regular nets respectively. ### Summary The main contribution of this paper lies in redefining the HT detection problem by introducing the new theoretical framework of "The Seeker’s Dilemma" and promoting the development of HT detection technology by creating a more challenging benchmark set. This not only helps to improve the performance of existing detection tools but also provides a new direction for future research.