Javascript must be enabled to continue!
A Survey on AI-Augmented Secure RTL Design for Hardware Trojan Prevention
View through CrossRef
Once, discreet circuit elements, called components, were heaped up on boards inside steel cages using wire-lead technology in just five short years. Fast forward to today, and your computer CPU fits about half an inch square on a chip. Both this constant miniaturization of electronic circuits and the rapid growth in the prevalence of third-party intellectual property parts have made hardware protection more worrisome than ever.Among all these issues, Hardware Trojans (HTs)—which represent corrupted or harmful additions during various design and fabrication stages—pose significant threats to system integrity, privacy of data, and essential infrastructure. Recent studies have investigated machine learning (ML) and artificial intelligence (AI) techniques designed to enable Hardware Trojans to be found, located, and eliminated in all stages from the register transfer level (RTL) and beyond.This survey gives an in-depth look at how AI can enhance RTL security. It classifies these AI-based techniques into four main categories:Graph-Based Techniques:GNNs, for instance, can be used to estimate the topology of circuits, extract structural characteristics, and thus find where some corruption has occurred.The SALTY framework applies Jumping-Knowledge GNNs to improve the accuracy location for hardware Trojans.Deep Learning in Side-Channel and Power-Analysis Techniques:Deep learning methods—such as Siamese Neural Networks (SNNs) and Long Short-Term Memory (LSTM) models—have been developed to detect abnormalities brought about by Trojans in power consumption or electromagnetic (EM) radiation, granting non-invasive practices clear security benefits.Studies show that these techniques are superior to the traditional golden-model side-channel detection techniques.Machine Learning Analysis of RTL Code:In conjunction with AI, research teams are now building nearest-neighbor classifiers and decision trees and using reinforcement learning (RL) to recognize occurrences of Trojans inside RTL code.Some research uses Verilog/VHDL conditional statements as features for ML, making it possible for early warning signals to be effectively detected and introducing a proactive security mechanism during the design phase.Comprehensive Security Measures and Logic Locking:A step-by-step methodology has evolved for prevention measures such as logic locking and layout hardening, which aims against a splendid prospect within reach.The TroLLoc framework uses logic obfuscation combined with security-aware placement and routing, thus mitigating security exposures post-design.However, comprehensive studies point out several outstanding problems: key recovery attacks and unintended data leakage related to security in logic locking.In this way, the paper evaluates various AI-driven security strategies in an organized, facilitative manner, thereby highlighting significant challenges and proposing future research directions.
Title: A Survey on AI-Augmented Secure RTL Design for Hardware Trojan Prevention
Description:
Once, discreet circuit elements, called components, were heaped up on boards inside steel cages using wire-lead technology in just five short years.
Fast forward to today, and your computer CPU fits about half an inch square on a chip.
Both this constant miniaturization of electronic circuits and the rapid growth in the prevalence of third-party intellectual property parts have made hardware protection more worrisome than ever.
Among all these issues, Hardware Trojans (HTs)—which represent corrupted or harmful additions during various design and fabrication stages—pose significant threats to system integrity, privacy of data, and essential infrastructure.
Recent studies have investigated machine learning (ML) and artificial intelligence (AI) techniques designed to enable Hardware Trojans to be found, located, and eliminated in all stages from the register transfer level (RTL) and beyond.
This survey gives an in-depth look at how AI can enhance RTL security.
It classifies these AI-based techniques into four main categories:Graph-Based Techniques:GNNs, for instance, can be used to estimate the topology of circuits, extract structural characteristics, and thus find where some corruption has occurred.
The SALTY framework applies Jumping-Knowledge GNNs to improve the accuracy location for hardware Trojans.
Deep Learning in Side-Channel and Power-Analysis Techniques:Deep learning methods—such as Siamese Neural Networks (SNNs) and Long Short-Term Memory (LSTM) models—have been developed to detect abnormalities brought about by Trojans in power consumption or electromagnetic (EM) radiation, granting non-invasive practices clear security benefits.
Studies show that these techniques are superior to the traditional golden-model side-channel detection techniques.
Machine Learning Analysis of RTL Code:In conjunction with AI, research teams are now building nearest-neighbor classifiers and decision trees and using reinforcement learning (RL) to recognize occurrences of Trojans inside RTL code.
Some research uses Verilog/VHDL conditional statements as features for ML, making it possible for early warning signals to be effectively detected and introducing a proactive security mechanism during the design phase.
Comprehensive Security Measures and Logic Locking:A step-by-step methodology has evolved for prevention measures such as logic locking and layout hardening, which aims against a splendid prospect within reach.
The TroLLoc framework uses logic obfuscation combined with security-aware placement and routing, thus mitigating security exposures post-design.
However, comprehensive studies point out several outstanding problems: key recovery attacks and unintended data leakage related to security in logic locking.
In this way, the paper evaluates various AI-driven security strategies in an organized, facilitative manner, thereby highlighting significant challenges and proposing future research directions.
Related Results
A survey on AI-augmented Secure RTL design for hardware trojan prevention
A survey on AI-augmented Secure RTL design for hardware trojan prevention
Once, discrete circuit elements, called components, were heaped up on boards inside steel cages using wire-lead technology in just five short years. Fast forward to today, and your...
Secure hardware IP of GLRT cascade using color interval graph based embedded fingerprint for ECG detector
Secure hardware IP of GLRT cascade using color interval graph based embedded fingerprint for ECG detector
AbstractThis paper presents a security aware design methodology to design secure generalized likelihood ratio test (GLRT) hardware intellectual property (IP) core for electrocardio...
Augmented Reality for Smoking Cessation: Development and Usability Study (Preprint)
Augmented Reality for Smoking Cessation: Development and Usability Study (Preprint)
BACKGROUND
The recent widespread availability of augmented reality via smartphone offers an opportunity to translate cue exposure therapy for smoking cessat...
Performance simulation methodologies for hardware/software co-designed processors
Performance simulation methodologies for hardware/software co-designed processors
Recently the community started looking into Hardware/Software (HW/SW) co-designed processors as potential solutions to move towards the less power consuming and the less complex de...
Survey on Hardware Security: PUFs, Trojans, and Side-Channel Attacks
Survey on Hardware Security: PUFs, Trojans, and Side-Channel Attacks
The increasing reliance on hardware technologies across critical sectors such as healthcare, defense, automotive, and finance has raised awareness of vulnerabilities in these syste...
Virtualizable hardware/software design infrastructure for dynamically partially reconfigurable systems
Virtualizable hardware/software design infrastructure for dynamically partially reconfigurable systems
In most existing works, reconfigurable hardware modules are still managed as conventional hardware devices. Further, the software reconfiguration overhead incurred by loading corre...
Genetic variations associated with telomere length affect the risk of gastric carcinoma
Genetic variations associated with telomere length affect the risk of gastric carcinoma
AbstractThis study aimed to further understand the role of relative telomere length (RTL) in susceptibility to gastric carcinoma (GC) and investigate the association between geneti...

