X-DFS: Explainable Artificial Intelligence Guided Design-for-Security Solution Space Exploration

IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-13 DOI:10.1109/TIFS.2024.3515855
Tanzim Mahfuz;Swarup Bhunia;Prabuddha Chakraborty
{"title":"X-DFS: Explainable Artificial Intelligence Guided Design-for-Security Solution Space Exploration","authors":"Tanzim Mahfuz;Swarup Bhunia;Prabuddha Chakraborty","doi":"10.1109/TIFS.2024.3515855","DOIUrl":null,"url":null,"abstract":"Design and manufacturing of integrated circuits predominantly use a globally distributed semiconductor supply chain involving diverse entities. The modern semiconductor supply chain has been designed to boost production efficiency, but is filled with major security concerns such as malicious modifications (hardware Trojans), reverse engineering (RE), and cloning. While being deployed, digital systems are also subject to a plethora of threats such as power, timing, and electromagnetic (EM) side channel attacks. Many Design-for-Security (DFS) solutions have been proposed to deal with these vulnerabilities, and such solutions (DFS) relays on strategic modifications (e.g., logic locking, side channel resilient masking, and dummy logic insertion) of the digital designs for ensuring a higher level of security. However, most of these DFS strategies lack robust formalism, are often not human-understandable, and require an extensive amount of human expert effort during their development/use. All of these factors make it difficult to keep up with the ever growing number of microelectronic vulnerabilities. In this work, we propose X-DFS, an explainable Artificial Intelligence (AI) guided DFS isolution-space exploration approach that can dramatically cut down the mitigation strategy development/use time while enriching our understanding of the vulnerability by providing human-understandable decision rationale. We implement X-DFS and comprehensively evaluate it for reverse engineering threats (SAIL, SWEEP, and OMLA) and formalize a generalized mechanism for applying X-DFS to defend against other threats such as hardware Trojans, fault attacks, and side channel attacks for seamless future extensions.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"753-766"},"PeriodicalIF":6.3000,"publicationDate":"2024-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10798618/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

Design and manufacturing of integrated circuits predominantly use a globally distributed semiconductor supply chain involving diverse entities. The modern semiconductor supply chain has been designed to boost production efficiency, but is filled with major security concerns such as malicious modifications (hardware Trojans), reverse engineering (RE), and cloning. While being deployed, digital systems are also subject to a plethora of threats such as power, timing, and electromagnetic (EM) side channel attacks. Many Design-for-Security (DFS) solutions have been proposed to deal with these vulnerabilities, and such solutions (DFS) relays on strategic modifications (e.g., logic locking, side channel resilient masking, and dummy logic insertion) of the digital designs for ensuring a higher level of security. However, most of these DFS strategies lack robust formalism, are often not human-understandable, and require an extensive amount of human expert effort during their development/use. All of these factors make it difficult to keep up with the ever growing number of microelectronic vulnerabilities. In this work, we propose X-DFS, an explainable Artificial Intelligence (AI) guided DFS isolution-space exploration approach that can dramatically cut down the mitigation strategy development/use time while enriching our understanding of the vulnerability by providing human-understandable decision rationale. We implement X-DFS and comprehensively evaluate it for reverse engineering threats (SAIL, SWEEP, and OMLA) and formalize a generalized mechanism for applying X-DFS to defend against other threats such as hardware Trojans, fault attacks, and side channel attacks for seamless future extensions.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
X-DFS:可解释人工智能引导的安全设计解决方案空间探索
集成电路的设计和制造主要使用涉及不同实体的全球分布式半导体供应链。现代半导体供应链旨在提高生产效率,但却充满了恶意修改(硬件木马)、逆向工程(RE)和克隆等重大安全问题。在部署过程中,数字系统也会受到大量威胁,如电源、时序和电磁(EM)侧信道攻击。已经提出了许多安全设计(DFS)解决方案来处理这些漏洞,这些解决方案(DFS)依赖于数字设计的战略修改(例如,逻辑锁定,侧通道弹性屏蔽和虚拟逻辑插入),以确保更高级别的安全性。然而,大多数DFS策略缺乏健壮的形式化,通常不是人类可以理解的,并且在开发/使用过程中需要大量的人类专家的努力。所有这些因素使得我们很难跟上不断增长的微电子漏洞。在这项工作中,我们提出了X-DFS,这是一种可解释的人工智能(AI)指导的DFS隔离空间探索方法,可以大大减少缓解策略的开发/使用时间,同时通过提供人类可理解的决策原理丰富我们对脆弱性的理解。我们实现了X-DFS,并对其进行了逆向工程威胁(SAIL、SWEEP和OMLA)的全面评估,并形式化了一种通用机制,用于应用X-DFS防御其他威胁,如硬件木马、故障攻击和侧通道攻击,以实现未来的无缝扩展。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security 工程技术-工程:电子与电气
CiteScore
14.40
自引率
7.40%
发文量
234
审稿时长
6.5 months
期刊介绍: The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
期刊最新文献
Scope: On Detecting Constrained Backdoor Attacks in Federated Learning Parameter Interpolation Adversarial Training for Robust Image Classification Distributed Physical Layer Authentication With Dynamic Soft Voting for Smart Distribution Grids Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning Comments on “VCD-FL: Verifiable, Collusion-Resistant, and Dynamic Federated Learning”
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1