Hiding in Plain Sight: Reframing Hardware Trojan Benchmarking as a Hide&Seek Modification

Amin Sarihi,Ahmad Patooghy,Peter Jamieson,Abdel-Hameed A. Badawy
DOI: https://doi.org/10.1109/LES.2024.3443155
2024-10-21
Abstract:This work focuses on advancing security research in the hardware design space by formally defining the realistic problem of Hardware Trojan (HT) detection. The goal is to model HT detection more closely to the real world, i.e., describing the problem as The Seeker's Dilemma where a detecting agent is unaware of whether circuits are infected by HTs or not. Using this theoretical problem formulation, we create a benchmark that consists of a mixture of HT-free and HT-infected restructured circuits while preserving their original functionalities. The restructured circuits are randomly infected by HTs, causing a situation where the defender is uncertain if a circuit is infected or not. We believe that our innovative benchmark and methodology of creating benchmarks will help the community judge the detection quality of different methods by comparing their success rates in circuit classification. We use our developed benchmark to evaluate three state-of-the-art HT detection tools to show baseline results for this approach. We use Principal Component Analysis to assess the strength of our benchmark, where we observe that some restructured HT-infected circuits are mapped closely to HT-free circuits, leading to significant label misclassification by detectors.
Cryptography and Security,Hardware Architecture,Machine Learning
What problem does this paper attempt to address?
This paper attempts to solve several key problems in Hardware Trojan (HT) detection: 1. **Limitations of Existing Benchmarks**: Current HT detection benchmarks are usually evaluated under the condition that the location and size of HT are known, which enables researchers to optimize for these specific situations. However, this approach is too idealized and does not conform to the real - world situation. In reality, detectors often do not know whether a circuit has been implanted with HT or the specific location of HT. 2. **Lack of Diversity and Balance**: Most of the existing HT benchmark datasets only contain infected circuits, or the number of HTs is too large, resulting in bias during the training of machine - learning models and being unable to effectively evaluate the true performance of HT detection tools. 3. **Defining Problems Closer to Practical Scenarios**: In order to more realistically simulate the challenges of HT detection, the paper proposes a new problem framework - "The Seeker’s Dilemma", analogizing the HT detection problem to a hiding - and - seeking game. In this framework, the detector (Seeker) does not know whether HT exists in the circuit or the specific number of HTs, thus increasing the difficulty of detection. ### Main Contributions 1. **Introducing "The Seeker’s Dilemma"**: By redefining the HT detection problem as a hiding - and - seeking game, the problem is made closer to the detection challenges in the real world. 2. **Creating a New Benchmark Dataset Seeker1**: This dataset contains circuits with randomly inserted HTs and uninfected circuits while maintaining the original functions unchanged. Whether HT exists in the dataset is unknown, thereby increasing the complexity and authenticity of detection. 3. **Evaluating Existing HT Detection Tools**: Three state - of - the - art HT detection tools are evaluated using the new benchmark, showing the performance of these tools on the new benchmark, and the effectiveness of the dataset is verified by Principal Component Analysis (PCA). Through these improvements, the paper aims to promote the progress of HT detection research and provide evaluation methods and tools closer to practical application scenarios.