ObfusX: Routing obfuscation with explanatory analysis of a machine learning attack

被引:0
|
作者
Zeng, Wei [1 ]
Davoodi, Azadeh [1 ]
Topaloglu, Rasit Onur [2 ]
机构
[1] Univ Wisconsin Madison, Dept Elect & Comp Engn, Madison, WI 53706 USA
[2] IBM Corp, Hopewell Jct, NY USA
基金
美国国家科学基金会;
关键词
Routing obfuscation; Split manufacturing; Explainable artificial intelligence; Machine learning; SPLIT; SECURITY;
D O I
10.1016/j.vlsi.2022.10.013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This is the first work that incorporates recent advancements in ???explainability???of machine learning (ML) to build a routing obfuscator called ObfusX. We adopt a recent metric???the SHAP value???which explains to what extent each layout feature can reveal each unknown connection for a recent ML-based split manufacturing attack model. The unique benefits of SHAP-based analysis include the ability to identify the best candidates for obfuscation, together with the dominant layout features which make them vulnerable. As a result, ObfusX can achieve better hit rate (97% lower) while perturbing significantly fewer nets when obfuscating using a via perturbation scheme, compared to prior work. When imposing the same wirelength limit using a wire lifting scheme, ObfusX performs significantly better in performance metrics (e.g., 2.2 times more reduction on average in percentage of netlist recovery).
引用
收藏
页码:47 / 55
页数:9
相关论文
共 50 条
  • [1] ObfusX: Routing Obfuscation with Explanatory Analysis of a Machine Learning Attack
    Zeng, Wei
    Davoodi, Azadeh
    Topaloglu, Rasit Onur
    2021 26TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2021, : 548 - 554
  • [2] SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation
    Chakraborty, Prabuddha
    Cruz, Joiiatha. N.
    Bhunia, Swamp
    PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2018, : 56 - 61
  • [3] Explanatory Interactive Machine Learning
    Teso, Stefano
    Kersting, Kristian
    AIES '19: PROCEEDINGS OF THE 2019 AAAI/ACM CONFERENCE ON AI, ETHICS, AND SOCIETY, 2019, : 239 - 245
  • [4] Machine Learning for Detecting the WestRock Ransomware Attack Using BGP Routing Records
    Li, Zhida
    Rios, Ana Laura Gonzalez
    Trajkovic, Ljiljana
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (03) : 20 - 26
  • [5] Attack graph analysis: An explanatory guide
    Zenitani, Kengo
    COMPUTERS & SECURITY, 2023, 126
  • [6] Optimal Obfuscation Mechanisms via Machine Learning
    Romanelli, Marco
    Chatzikokolakis, Kostantinos
    Palamidessi, Catuscia
    2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 153 - 168
  • [7] Beneficial and harmful explanatory machine learning
    Lun Ai
    Stephen H. Muggleton
    Céline Hocquette
    Mark Gromowski
    Ute Schmid
    Machine Learning, 2021, 110 : 695 - 721
  • [8] Beneficial and harmful explanatory machine learning
    Ai, Lun
    Muggleton, Stephen H.
    Hocquette, Celine
    Gromowski, Mark
    Schmid, Ute
    MACHINE LEARNING, 2021, 110 (04) : 695 - 721
  • [9] Improving Explanatory Power of Machine Learning in the Symbolic Data Analysis Framework
    Diday, E.
    PROGRESS IN ARTIFICIAL INTELLIGENCE AND PATTERN RECOGNITION, IWAIPR 2018, 2018, 11047 : 3 - 14
  • [10] Comparative Analysis of Routing Schemes Based on Machine Learning
    Yang, Shaoyu
    Tan, Cong
    Madsen, Dag Oivind
    Xiang, Haige
    Li, Yun
    Khan, Imran
    Choi, Bong Jun
    MOBILE INFORMATION SYSTEMS, 2022, 2022