Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can bypass the security of critical infrastructures. Although researchers have proposed many techniques to detect HTs, several limitations exist, including: (i) a low success rate, (ii) high algorithmic complexity, and (iii) a large number of test patterns. Furthermore, the most pertinent drawback of prior detection techniques stems from an incorrect evaluation methodology, i.e., they assume that an adversary inserts HTs randomly. Such inappropriate adversarial assumptions enable detection techniques to claim high HT detection accuracy, leading to a "false sense of security." Unfortunately, to the best of our knowledge, despite more than a decade of research on detecting HTs inserted during fabrication, there have been no concerted efforts to perform a systematic evaluation of HT detection techniques. In this paper, we play the role of a realistic adversary and question the efficacy of HT detection techniques by developing an automated, scalable, and practical attack framework, ATTRITION, using reinforcement learning (RL). ATTRITION evades eight detection techniques across two HT detection categories, showcasing its agnostic behavior. ATTRITION achieves average attack success rates of $47\times$ and $211\times$ compared to randomly inserted HTs against state-of-the-art HT detection techniques. We demonstrate ATTRITION's ability to evade detection techniques by evaluating designs ranging from the widely-used academic suites to larger designs such as the open-source MIPS and mor1kx processors to AES and a GPS module. Additionally, we showcase the impact of ATTRITION-generated HTs through two case studies (privilege escalation and kill switch) on the mor1kx processor. We envision that our work, along with our released HT benchmarks and models, fosters the development of better HT detection techniques.
翻译:建立集成电路的过程中插入的隐秘硬件Trojans (HTs) 可能绕过关键基础设施的安全性。 尽管研究人员提出了许多检测HT的技术,但存在一些限制,包括:(一) 成功率低,(二) 算法复杂性高,以及(三) 大量测试模式。此外,先前检测技术最相关的缺陷源于不正确的评估方法,即,他们假设对手随机插入HTs。这种不适当的公开对立假设使得探测技术能够声称HT检测的准确性高,导致“安全感下降 ” 。不幸的是,对于我们最广泛的知识而言,尽管在制造过程中插入了超过十年的关于检测HTs的研究,但并没有做出协调一致的努力,对HT1 检测技术进行系统的系统评估。 在本文件中,我们运用一个自动、可缩放、实用的攻击框架,我们使用强化的(RL),对两个HT型平均检测值类别中的八种检测技术进行回避, 显示其测试能力水平水平比HT1级测试, 显示其测试的测试速度为HT型测试速度,从而显示Htrealtrial的测试的测试。