Abstract
Security assurance in a computer system can be viewed as distinguishing between self and non-self; such is the view of Artificial Immune Systems (AIS), which are a class of Machine Learning (ML) algorithms, inspired by innate behavior of biological immune systems that have evolved over generations to accurately classify self-behavior from non-self-behavior to fight diseases. This chapter describes a technique leveraging AIS-based ML techniques and the associated software tool used to identify behavioral traits in high-level hardware descriptions for classifying unsafe or undesirable behaviors. Such behaviors include those caused by human error during development, or intentional, malicious circuit modifications, known as hardware Trojans, without the need for a golden reference model. Negative Selection and Clonal Selection Algorithms, which have historically been applied to malware detection on software binaries to detect potentially unsafe or malicious behavior, are applied to analyze hardware control and data-flow graphs (CDFGs) of Trojan-inserted benchmarks to train an AIS behavior model, against which novel hardware descriptions may be tested. This model efficiently detects specified (Trojan or Trojan-like) behavior with an accuracy of 86.3% and an average false negative rate of 12.6% for Negative Selection and 12.8% for Clonal Selection.***
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: threats and emerging solutions. In: High Level Design Validation and Test Workshop, 2009. HLDVT 2009. IEEE International, pp. 166–171. IEEE, New York (2009)
Bhunia, S., Hsiao, M.S., Banga, M., Narasimhan, S.: Hardware Trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014)
Narasimhan, S., Wang, X., Du, D., Chakraborty, R.S., Bhunia, S.: TeSR: a robust temporal self-referencing approach for hardware Trojan detection. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 71–74. IEEE, New York (2011)
Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: a statistical approach for hardware Trojan detection. In: Cryptographic Hardware and Embedded Systems-CHES 2009, pp. 396–410. Springer, New York (2009)
Zhang, X., Tehranipoor, M.: Case study: detecting hardware Trojans in third-party digital IP cores. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 67–70. IEEE, New York (2011)
Fern, N., Cheng, K.T.T.: Detecting hardware Trojans in unspecified functionality using mutation testing. In: Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, pp. 560–566. IEEE Press, New York (2015)
Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994. Proceedings, pp. 202–212. IEEE, New York (1994)
Kephart, J.O., et al.: A biologically inspired immune system for computers. In: Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems, pp. 130–139 (1994)
Zhang, P.T., Wang, W., Tan, Y.: A malware detection model based on a negative selection algorithm with penalty factor. Sci. China Inf. Sci. 53(12), 2461–2471 (2010)
Al Daoud, E.: Metamorphic viruses detection using artificial immune system. In: International Conference on Communication Software and Networks, 2009, ICCSN’09, pp. 168–172. IEEE, New York (2009)
Guo, Z., Liu, Z., Tan, Y.: An NN-based malicious executables detection algorithm based on immune principles. In: International Symposium on Neural Networks, pp. 675–680. Springer, New York (2004)
Al-Sheshtawi, K.A., Abdul-Kader, H.M., Ismail, N.A.: Artificial immune clonal selection classification algorithms for classifying malware and benign processes using API call sequences. Int. J. Comput. Sci. Netw. Secur. 10(4), 31–39 (2010)
De Castro, L.N., Von Zuben, F.J.: Learning and optimization using the clonal selection principle. IEEE Trans. Evolut. Comput. 6(3), 239–251 (2002)
Tan, K.C., Goh, C.K., Mamun, A.A., Ei, E.Z.: An evolutionary artificial immune system for multi-objective optimization. Eur. J. Oper. Res. 187(2), 371–392 (2008)
De Castro, L.N., Von Zuben, F.J.: The clonal selection algorithm with engineering applications. In: Proceedings of GECCO, vol. 2000, pp. 36–39 (2000)
Salmani, H., Tehranipoor, M., Karri, R.: On design vulnerability analysis and trust benchmarks development. In: 2013 IEEE 31st International Conference on Computer Design (ICCD), pp. 471–474. IEEE, New York (2013)
Shakya, B., He, T., Salmani, H., Forte, D., Bhunia, S., Tehranipoor, M.: Benchmarking of hardware Trojans and maliciously affected circuits. J. Hardware Syst. Secur. 1(1), 85–102 (2017)
Takamaeda-Yamazaki, S.: Python-based hardware design processing toolkit for verilog HDL. In: International Symposium on Applied Reconfigurable Computing, pp. 451–460. Springer, New York (2015)
Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting malicious inclusions in secure hardware: challenges and solutions. In: IEEE International Workshop on Hardware-Oriented Security and Trust, 2008. HOST 2008, pp. 15–19. IEEE, New York (2008)
Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)
Li, H., Liu, Q., Zhang, J.: A survey of hardware Trojan threat and defense. Integr. VLSI J. 55, 426–437 (2016)
Bhunia, S., Tehranipoor, M.M.: The Hardware Trojan War: Attacks, Myths, and Defenses. Springer, New York (2017)
Jha, S., Jha, S.K.: Randomization based probabilistic approach to detect Trojan circuits. In: Proceedings of the 2008 11th IEEE High Assurance Systems Engineering Symposium, HASE ’08, p. 117–124. IEEE Computer Society, New York (2008). https://doi.org/10.1109/HASE.2008.37
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP ’07, p. 296–310. IEEE Computer Society, New York (2007). https://doi.org/10.1109/SP.2007.36
Bloom, G., Narahari, B., Simha, R.: OS support for detecting Trojan circuit attacks. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 100–103 (2009)
Banga, M., Hsiao, M.S.: A novel sustained vector technique for the detection of hardware Trojans. In: 2009 22nd International Conference on VLSI Design, pp. 327–332. IEEE, New York (2009)
Iwase, T., Nozaki, Y., Yoshikawa, M., Kumaki, T.: Detection technique for hardware Trojans using machine learning in frequency domain. In: 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), pp. 185–186. IEEE, New York (2015)
Lodhi, F.K., Abbasi, I., Khalid, F., Hasan, O., Awwad, F., Hasan, S.R.: A self-learning framework to detect the intruded integrated circuits. In: 2016 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1702–1705. IEEE, New York (2016)
Bao, C., Forte, D., Srivastava, A.: On application of one-class SVM to reverse engineering-based hardware Trojan detection. In: 2014 15th International Symposium on Quality Electronic Design (ISQED), pp. 47–54. IEEE, New York (2014)
Hasegawa, K., Oya, M., Yanagisawa, M., Togawa, N.: Hardware Trojans classification for gate-level netlists based on machine learning. In: 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 203–206. IEEE, New York (2016)
Oya, M., Shi, Y., Yanagisawa, M., Togawa, N.: A score-based classification method for identifying hardware-Trojans at gate-level netlists. In: Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, EDA Consortium, pp. 465–470 (2015)
Waksman, A., Suozzo, M., Sethumadhavan, S.: FANCI: identification of stealthy malicious logic using Boolean functional analysis. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security, pp. 697–708. ACM, New York (2013)
Zhang, J., Yuan, F., Wei, L., Liu, Y., Xu, Q.: VeriTrust: verification for hardware trust. IEEE Trans. Comput.-Aid. Des. Integr. Circ. Syst. 34(7), 1148–1161 (2015)
Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)
Alberts, B., Bray, D., Lewis, J., Raff, M., Roberts, K., Watson, J.: Molecular Biology of the Cell, 4th edn. Garland, New York (2002)
Murphy, K., Weaver, C.: Janeway’s Immunobiology. Garland Science, New York (2016)
Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolut. Comput. 8(4), 443–473 (2000)
Dasgupta, D., Yu, S., Nino, F.: Recent advances in artificial immune systems: models and applications. Appl. Soft Comput. 11(2), 1574–1587 (2011)
Romagnani, S.: Immunological tolerance and autoimmunity. Intern. Emerg. Med. 1(3), 187–196 (2006)
Owen, J.A., Punt, J., Stranford, S.A., et al.: Kuby Immunology. WH Freeman, New York (2013)
Zareen, F., Karam, R.: Detecting RTL Trojans using artificial immune systems and high level behavior classification. In: 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 68–73 (2018). https://doi.org/10.1109/AsianHOST.2018.8607172
Burnet, F.M., et al.: A modification of Jerne’s theory of antibody production using the concept of clonal selection. Austr. J. Sci. 20(3), 67–9 (1957)
Victora, G.D., Nussenzweig, M.C.: Germinal centers. Annu. Rev. Immunol. 30, 429–457 (2012)
Weinand, R.G.: Somatic mutation, affinity maturation and the antibody repertoire: a computer model. J. Theoret. Biol. 143(3), 343–382 (1990)
He, M.X., Petoukhov, S.V., Ricci, P.E.: Genetic code, hamming distance and stochastic matrices. Bull. Math. Biol. 66(5), 1405–1421 (2004)
Allen, F.E.: Control flow analysis. In: Proceedings of a Symposium on Compiler Optimization, pp. 1–19. ACM, New York (1970). http://doi.acm.org/10.1145/800028.808479
Williamson, M.C., Lee, E.A.: Synthesis of parallel hardware implementations from synchronous dataflow graph specifications. In: Conference Record of the Thirtieth Asilomar Conference on Signals, Systems and Computers, vol. 2, pp. 1340–1343 (1996). https://doi.org/10.1109/ACSSC.1996.599166
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Zareen, F., Karam, R. (2022). A Framework for Detecting Hardware Trojans in RTL Using Artificial Immune Systems. In: Katkoori, S., Islam, S.A. (eds) Behavioral Synthesis for Hardware Security. Springer, Cham. https://doi.org/10.1007/978-3-030-78841-4_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-78841-4_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78840-7
Online ISBN: 978-3-030-78841-4
eBook Packages: Computer ScienceComputer Science (R0)