ObfusX: Routing obfuscation with explanatory analysis of a machine learning attack

被引:0
|
作者
Zeng, Wei [1 ]
Davoodi, Azadeh [1 ]
Topaloglu, Rasit Onur [2 ]
机构
[1] Univ Wisconsin Madison, Dept Elect & Comp Engn, Madison, WI 53706 USA
[2] IBM Corp, Hopewell Jct, NY USA
基金
美国国家科学基金会;
关键词
Routing obfuscation; Split manufacturing; Explainable artificial intelligence; Machine learning; SPLIT; SECURITY;
D O I
10.1016/j.vlsi.2022.10.013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This is the first work that incorporates recent advancements in ???explainability???of machine learning (ML) to build a routing obfuscator called ObfusX. We adopt a recent metric???the SHAP value???which explains to what extent each layout feature can reveal each unknown connection for a recent ML-based split manufacturing attack model. The unique benefits of SHAP-based analysis include the ability to identify the best candidates for obfuscation, together with the dominant layout features which make them vulnerable. As a result, ObfusX can achieve better hit rate (97% lower) while perturbing significantly fewer nets when obfuscating using a via perturbation scheme, compared to prior work. When imposing the same wirelength limit using a wire lifting scheme, ObfusX performs significantly better in performance metrics (e.g., 2.2 times more reduction on average in percentage of netlist recovery).
引用
收藏
页码:47 / 55
页数:9
相关论文
共 50 条
  • [41] Bayesian CAIPI: A Probabilistic Approach to Explanatory and Interactive Machine Learning
    Slany, Emanuel
    Scheele, Stephan
    Schmid, Ute
    ARTIFICIAL INTELLIGENCE-ECAI 2023 INTERNATIONAL WORKSHOPS, PT 1, XAI3, TACTIFUL, XI-ML, SEDAMI, RAAIT, AI4S, HYDRA, AI4AI, 2023, 2024, 1947 : 285 - 301
  • [42] Analysis of machine learning algorithms for DDoS attack detection in connected cars environment
    El Attar, Ali
    Wehby, Ayoub
    Chbib, Fadlallah
    Mehrez, Hassane Aissaoui
    Fadlallah, Ahmad
    Hachem, Joel
    Khatoun, Rida
    2023 EIGHTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES, MOBISECSERV, 2023,
  • [43] A Comprehensive Analysis of Network Security Attack Classification using Machine Learning Algorithms
    Alqahtani, Abdulaziz Saeed
    Altammami, Osamah A.
    Haq, Mohd Anul
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (04) : 1269 - 1280
  • [44] A comparative analysis of machine learning techniques for detecting probing attack with SHAP algorithm
    Rabbi, Fazla
    Hossain, Niamat Ullah Ibne
    Das, Saikat
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 271
  • [45] SubStop: An analysis on subscription email bombing attack and machine learning based mitigation
    Lahaa, Aurobinda
    Yasarb, Md Tahmid
    Chengb, Yu
    HIGH-CONFIDENCE COMPUTING, 2022, 2 (04):
  • [46] Explanatory Approach for Evaluation of Machine Learning-induced Knowledge
    Zorman, M.
    Verlic, M.
    JOURNAL OF INTERNATIONAL MEDICAL RESEARCH, 2009, 37 (05) : 1543 - 1551
  • [47] Study of Masquerade Attack in VANETs with Machine Learning
    Chaouche, Yasmine
    Renault, Eric
    Boussaha, Ryma
    MACHINE LEARNING FOR NETWORKING, MLN 2023, 2024, 14525 : 167 - 184
  • [48] Machine Learning Based DDoS Attack Detection
    Ajeetha, G.
    Priya, Madhu G.
    2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,
  • [49] Attack Detection in IoT using Machine Learning
    Anwer, Maryam
    Khan, Shariq Mahmood
    Farooq, Muhammad Umer
    Waseemullah
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (03) : 7273 - 7278
  • [50] A Flexible Poisoning Attack Against Machine Learning
    Jiang, Wenbo
    Li, Hongwei
    Liu, Sen
    Ren, Yanzhi
    He, Miao
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,