55 research outputs found
Threats on Logic Locking: A Decade Later
To reduce the cost of ICs and to meet the market's demand, a considerable
portion of manufacturing supply chain, including silicon fabrication, packaging
and testing may be pushed offshore. Utilizing a global IC manufacturing supply
chain, and inclusion of non-trusted parties in the supply chain has raised
concerns over security and trust related challenges including those of
overproduction, counterfeiting, IP piracy, and Hardware Trojans to name a few.
To reduce the risk of IC manufacturing in an untrusted and globally distributed
supply chain, the researchers have proposed various locking and obfuscation
mechanisms for hiding the functionality of the ICs during the manufacturing,
that requires the activation of the IP after fabrication using the key value(s)
that is only known to the IP/IC owner. At the same time, many such proposed
obfuscation and locking mechanisms are broken with attacks that exploit the
inherent vulnerabilities in such solutions. The past decade of research in this
area, has resulted in many such defense and attack solutions. In this paper, we
review a decade of research on hardware obfuscation from an attacker
perspective, elaborate on attack and defense lessons learned, and discuss
future directions that could be exploited for building stronger defenses
On Designing Secure and Robust Scan Chain for Protecting Obfuscated Logic
In this paper, we assess the security and testability of the state-of-the-art
design-for-security (DFS) architectures in the presence of scan-chain
locking/obfuscation, a group of solution that has previously proposed to
restrict unauthorized access to the scan chain. We discuss the key leakage
vulnerability in the recently published prior-art DFS architectures. This
leakage relies on the potential glitches in the DFS architecture that could
lead the adversary to make a leakage condition in the circuit. Also, we
demonstrate that the state-of-the-art DFS architectures impose some substantial
architectural drawbacks that moderately affect both test flow and design
constraints. We propose a new DFS architecture for building a secure scan chain
architecture while addressing the potential of key leakage. The proposed
architecture allows the designer to perform the structural test with no
limitation, enabling an untrusted foundry to utilize the scan chain for
manufacturing fault testing without needing to access the scan chain. Our
proposed solution poses negligible limitation/overhead on the test flow, as
well as the design criteria
SCRAMBLE: The State, Connectivity and Routing Augmentation Model for Building Logic Encryption
In this paper, we introduce SCRAMBLE, as a novel logic locking solution for
sequential circuits while the access to the scan chain is restricted. The
SCRAMBLE could be used to lock an FSM by hiding its state transition graph
(STG) among a large number of key-controlled false transitions. Also, it could
be used to lock sequential circuits (sequential datapath) by hiding the timing
paths' connectivity among a large number of key-controlled false connections.
Besides, the structure of SCRAMBLE allows us to engage this scheme as a new
scan chain locking solution by hiding the correct scan chain sequence among a
large number of the key-controlled false sequences. We demonstrate that the
proposed scheme resists against both (1) the 2-stage attacks on FSM, and (2)
SAT attacks integrated with unrolling as well as bounded-model-checking. We
have discussed two variants of SCRAMBLE: (I) Connectivity SCRAMBLE
(SCRAMBLE-C), and (b) Logic SCRAMBLE (SCRAMBLE-L). The SCRAMBLE-C relies on the
SAT-hard and key-controlled modules that are built using near non-blocking
logarithmic switching networks. The SCRAMBLE-L uses input multiplexing
techniques to hide a part of the FSM in a memory. In the result section, we
describe the effectiveness of each variant against state-of-the-art attacks
NESTA: Hamming Weight Compression-Based Neural Proc. Engine
In this paper, we present NESTA, a specialized Neural engine that
significantly accelerates the computation of convolution layers in a deep
convolutional neural network, while reducing the computational energy. NESTA
reformats Convolutions into batches and uses a hierarchy of
Hamming Weight Compressors to process each batch. Besides, when processing the
convolution across multiple channels, NESTA, rather than computing the precise
result of a convolution per channel, quickly computes an approximation of its
partial sum, and a residual value such that if added to the approximate partial
sum, generates the accurate output. Then, instead of immediately adding the
residual, it uses (consumes) the residual when processing the next batch in the
hamming weight compressors with available capacity. This mechanism shortens the
critical path by avoiding the need to propagate carry signals during each round
of computation and speeds up the convolution of each channel. In the last stage
of computation, when the partial sum of the last channel is computed, NESTA
terminates by adding the residual bits to the approximate output to generate a
correct result
TCD-NPE: A Re-configurable and Efficient Neural Processing Engine, Powered by Novel Temporal-Carry-deferring MACs
In this paper, we first propose the design of Temporal-Carry-deferring MAC
(TCD-MAC) and illustrate how our proposed solution can gain significant energy
and performance benefit when utilized to process a stream of input data. We
then propose using the TCD-MAC to build a reconfigurable, high speed, and low
power Neural Processing Engine (TCD-NPE). We, further, propose a novel
scheduler that lists the sequence of needed processing events to process an MLP
model in the least number of computational rounds in our proposed TCD-NPE. We
illustrate that our proposed TCD-NPE significantly outperform similar neural
processing solutions that use conventional MACs in terms of both energy
consumption and execution time
LUT-Lock: A Novel LUT-based Logic Obfuscation for FPGA-Bitstream and ASIC-Hardware Protection
In this work, we propose LUT-Lock, a novel Look-Up-Table-based netlist
obfuscation algorithm, for protecting the intellectual property that is mapped
to an FPGA bitstream or an ASIC netlist. We, first, illustrate the
effectiveness of several key features that make the LUT-based obfuscation more
resilient against SAT attacks and then we embed the proposed key features into
our proposed LUT-Lock algorithm. We illustrates that LUT-Lock maximizes the
resiliency of the LUT-based obfuscation against SAT attacks by forcing a near
exponential increase in the execution time of a SAT solver with respect to the
number of obfuscated gates. Hence, by adopting LUT-Lock algorithm, SAT attack
execution time could be made unreasonably long by increasing the number of
utilized LUTs
DynGraph2Seq: Dynamic-Graph-to-Sequence Interpretable Learning for Health Stage Prediction in Online Health Forums
Online health communities such as the online breast cancer forum enable
patients (i.e., users) to interact and help each other within various
subforums, which are subsections of the main forum devoted to specific health
topics. The changing nature of the users' activities in different subforums can
be strong indicators of their health status changes. This additional
information could allow health-care organizations to respond promptly and
provide additional help for the patient. However, modeling complex transitions
of an individual user's activities among different subforums over time and
learning how these correspond to his/her health stage are extremely
challenging. In this paper, we first formulate the transition of user
activities as a dynamic graph with multi-attributed nodes, then formalize the
health stage inference task as a dynamic graph-to-sequence learning problem,
and hence propose a novel dynamic graph-to-sequence neural networks
architecture (DynGraph2Seq) to address all the challenges. Our proposed
DynGraph2Seq model consists of a novel dynamic graph encoder and an
interpretable sequence decoder that learn the mapping between a sequence of
time-evolving user activity graphs and a sequence of target health stages. We
go on to propose dynamic graph hierarchical attention mechanisms to facilitate
the necessary multi-level interpretability. A comprehensive experimental
analysis of its use for a health stage prediction task demonstrates both the
effectiveness and the interpretability of the proposed models.Comment: 6 pages. Accepted as ICDM 2019 Short Paper. Final Versio
Conditional Classification: A Solution for Computational Energy Reduction
Deep convolutional neural networks have shown high efficiency in computer
visions and other applications. However, with the increase in the depth of the
networks, the computational complexity is growing exponentially. In this paper,
we propose a novel solution to reduce the computational complexity of
convolutional neural network models used for many class image classification.
Our proposed technique breaks the classification task into two steps: 1)
coarse-grain classification, in which the input samples are classified among a
set of hyper-classes, 2) fine-grain classification, in which the final labels
are predicted among those hyper-classes detected at the first step. We
illustrate that our proposed classifier can reach the level of accuracy
reported by the best in class classification models with less computational
complexity (Flop Count) by only activating parts of the model that are needed
for the image classification.Comment: paper need to be majorly revise
NNgSAT: Neural Network guided SAT Attack on Logic Locked Complex Structures
The globalization of the IC supply chain has raised many security threats,
especially when untrusted parties are involved. This has created a demand for a
dependable logic obfuscation solution to combat these threats. Amongst a wide
range of threats and countermeasures on logic obfuscation in the 2010s decade,
the Boolean satisfiability (SAT) attack, or one of its derivatives, could break
almost all state-of-the-art logic obfuscation countermeasures. However, in some
cases, particularly when the logic locked circuits contain complex structures,
such as big multipliers, large routing networks, or big tree structures, the
logic locked circuit is hard-to-be-solved for the SAT attack. Usage of these
structures for obfuscation may lead a strong defense, as many SAT solvers fail
to handle such complexity. However, in this paper, we propose a
neural-network-guided SAT attack (NNgSAT), in which we examine the capability
and effectiveness of a message-passing neural network (MPNN) for solving these
complex structures (SAT-hard instances). In NNgSAT, after being trained as a
classifier to predict SAT/UNSAT on a SAT problem (NN serves as a SAT solver),
the neural network is used to guide/help the actual SAT solver for finding the
SAT assignment(s). By training NN on conjunctive normal forms (CNFs)
corresponded to a dataset of logic locked circuits, as well as fine-tuning the
confidence rate of the NN prediction, our experiments show that NNgSAT could
solve 93.5% of the logic locked circuits containing complex structures within a
reasonable time, while the existing SAT attack cannot proceed the attack flow
in them
Diverse Knowledge Distillation (DKD): A Solution for Improving The Robustness of Ensemble Models Against Adversarial Attacks
This paper proposes an ensemble learning model that is resistant to
adversarial attacks. To build resilience, we introduced a training process
where each member learns a radically distinct latent space. Member models are
added one at a time to the ensemble. Simultaneously, the loss function is
regulated by a reverse knowledge distillation, forcing the new member to learn
different features and map to a latent space safely distanced from those of
existing members. We assessed the security and performance of the proposed
solution on image classification tasks using CIFAR10 and MNIST datasets and
showed security and performance improvement compared to the state of the art
defense methods
- …