Please use this identifier to cite or link to this item:
Title: Two sides of the same coin : boons and banes of machine learning in hardware security
Authors: Liu, Wenye
Chang, Chip Hong
Wang, Xueyang
Liu, Chen
Fung, Jason M.
Mohammad Ebrahimabadi
Karimi, Naghmeh
Meng, Xingyu
Basu, Kanad
Keywords: Engineering::Electrical and electronic engineering::Computer hardware, software and systems
Issue Date: 2021
Source: Liu, W., Chang, C. H., Wang, X., Liu, C., Fung, J. M., Mohammad Ebrahimabadi, Karimi, N., Meng, X. & Basu, K. (2021). Two sides of the same coin : boons and banes of machine learning in hardware security. IEEE Journal On Emerging and Selected Topics in Circuits and Systems, 11(2), 228-251.
Project: CHFA-GC1-AW01
Journal: IEEE Journal on Emerging and Selected Topics in Circuits and Systems
Abstract: The last decade has witnessed remarkable research advances at the intersection of machine learning (ML) and hardware security. The confluence of the two technologies has created many interesting and unique opportunities, but also left some issues in their wake. ML schemes have been extensively used to enhance the security and trust of embedded systems like hardware Trojans and malware detection. On the other hand, ML-based approaches have also been adopted by adversaries to assist side-channel attacks, reverse engineer integrated circuits and break hardware security primitives like Physically Unclonable Functions (PUFs). Deep learning is a subfield of ML. It can continuously learn from a large amount of labeled data with a layered structure. Despite the impressive outcomes demonstrated by deep learning in many application scenarios, the dark side of it has not been fully exposed yet. The inability to fully understand and explain what has been done within the super-intelligence can turn an inherently benevolent system into malevolent. Recent research has revealed that the outputs of Deep Neural Networks (DNNs) can be easily corrupted by imperceptibly small input perturbations. As computations are brought nearer to the source of data creation, the attack surface of DNN has also been extended from the input data to the edge devices. Accordingly, due to the opportunities of ML-assisted security and the vulnerabilities of ML implementation, in this paper, we will survey the applications, vulnerabilities and fortification of ML from the perspective of hardware security. We will discuss the possible future research directions, and thereby, sharing a roadmap for the hardware security community in general.
ISSN: 2156-3357
DOI: 10.1109/JETCAS.2021.3084400
Rights: © 2021 IEEE. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:EEE Journal Articles

Files in This Item:
File Description SizeFormat 
Two Sides of the Same Coin_ Boons and Banes of Machine Learning in Hardware Security.pdf2.42 MBAdobe PDFView/Open

Page view(s)

Updated on May 15, 2022


Updated on May 15, 2022

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.