Adaptable and Divergent Synthetic Benchmark Generation for Hardware Security

Benchmarking can drive the development of technologies by facilitating standardization of features for comparison of different methods. While hardware security has seen an exponential growth in innovation throughout the last decade, the lack of sufficient benchmarks for data-driven analysis is promi...

Full description

Saved in:
Bibliographic Details
Published in:Digest of technical papers - IEEE/ACM International Conference on Computer-Aided Design pp. 1 - 9
Main Authors: Amir, Sarah, Forte, Domenic
Format: Conference Proceeding
Language:English
Published: Association on Computer Machinery 02.11.2020
Subjects:
ISSN:1558-2434
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Benchmarking can drive the development of technologies by facilitating standardization of features for comparison of different methods. While hardware security has seen an exponential growth in innovation throughout the last decade, the lack of sufficient benchmarks for data-driven analysis is prominent. Researchers must currently rely on decades-old VLSI benchmarks, which in most cases were not designed with security evaluation in mind. Considering the present day computational power, these benchmarks lack in both quality and quantity for usage in hardware security topics such as obfuscation and hardware Trojans. Many advanced techniques, like statistical analysis and machine learning, require a large number of samples in order to sufficiently examine the feature space. In an attempt to resolve this issue, we have developed the first synthetic benchmark generation process flow. This paper describes our novel technique that utilizes linear optimization to generate an endless number of synthetic combinational benchmarks that are adaptable to user input constraints and divergent in quantifiable structural features from input reference benchmarks. Thus, our framework offers customization for generating richer and more challenging benchmarks for data-driven hardware security. Through experimentation, we verify that our benchmarks offers more structural variation than the current benchmark suites.
AbstractList Benchmarking can drive the development of technologies by facilitating standardization of features for comparison of different methods. While hardware security has seen an exponential growth in innovation throughout the last decade, the lack of sufficient benchmarks for data-driven analysis is prominent. Researchers must currently rely on decades-old VLSI benchmarks, which in most cases were not designed with security evaluation in mind. Considering the present day computational power, these benchmarks lack in both quality and quantity for usage in hardware security topics such as obfuscation and hardware Trojans. Many advanced techniques, like statistical analysis and machine learning, require a large number of samples in order to sufficiently examine the feature space. In an attempt to resolve this issue, we have developed the first synthetic benchmark generation process flow. This paper describes our novel technique that utilizes linear optimization to generate an endless number of synthetic combinational benchmarks that are adaptable to user input constraints and divergent in quantifiable structural features from input reference benchmarks. Thus, our framework offers customization for generating richer and more challenging benchmarks for data-driven hardware security. Through experimentation, we verify that our benchmarks offers more structural variation than the current benchmark suites.
Author Amir, Sarah
Forte, Domenic
Author_xml – sequence: 1
  givenname: Sarah
  surname: Amir
  fullname: Amir, Sarah
  email: sarah.amir@ufl.edu
  organization: University of Florida,Gainesville,Florida,USA,32611
– sequence: 2
  givenname: Domenic
  surname: Forte
  fullname: Forte, Domenic
  email: dforte@ece.ufl.edu
  organization: University of Florida,Gainesville,Florida,USA,32611
BookMark eNotj8FOAjEURavRRETWLtz0BwbbvtdOu0REMCFxAXvSmb5KIxZSqoa_l0RX96xOzr1lV3mfibF7KcZSon4EFAKEGgNKbdBesJFrrTRGowKFcMkGUmvbnBFv2Oh4TJ1AFKidtQO2nAR_qL7bEfc58Of0TeWdcuWrU65bqqnnT5T77acvH3xOmYqvaZ953Be-8CX8-EJ8Rf1XSfV0x66j3x1p9L9Dtn6ZraeLZvk2f51Olo1X2NbGBkkoQ9RWxGC68wcfdA-6D4509MqCMQjknFXRdyFKYWPvoAVHbQcEQ_bwp01EtDmUdI47bZzSRlsDv9I1UA4
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1145/3400302.3415648
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781665423243
1665423242
EISSN 1558-2434
EndPage 9
ExternalDocumentID 9256586
Genre orig-research
GrantInformation_xml – fundername: NSF
  grantid: CNS 1651701
  funderid: 10.13039/501100001809
GroupedDBID 6IE
6IF
6IH
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
FEDTE
IEGSK
IJVOP
M43
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-a247t-8d1e41df580fd6b145ad5c35cd9e5fa2836643e9982fabdf108fc93739e7b3e3
IEDL.DBID RIE
ISICitedReferencesCount 6
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000671087100078&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 02:28:38 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a247t-8d1e41df580fd6b145ad5c35cd9e5fa2836643e9982fabdf108fc93739e7b3e3
PageCount 9
ParticipantIDs ieee_primary_9256586
PublicationCentury 2000
PublicationDate 2020-Nov.-2
PublicationDateYYYYMMDD 2020-11-02
PublicationDate_xml – month: 11
  year: 2020
  text: 2020-Nov.-2
  day: 02
PublicationDecade 2020
PublicationTitle Digest of technical papers - IEEE/ACM International Conference on Computer-Aided Design
PublicationTitleAbbrev ICCAD
PublicationYear 2020
Publisher Association on Computer Machinery
Publisher_xml – name: Association on Computer Machinery
SSID ssib044045988
ssj0020286
Score 2.1926177
Snippet Benchmarking can drive the development of technologies by facilitating standardization of features for comparison of different methods. While hardware security...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Benchmark testing
circuit optimisation
combinational circuits
data-driven analysis
data-driven hardware security
exponential growth
feature space
Hardware
hardware security
input reference benchmarks
invasive software
linear optimization
linear programming
Logic gates
machine learning
Optimization
quantifiable structural features
Security
security evaluation
statistical analysis
Synthetic benchmark
synthetic benchmark generation process flow
synthetic combinational benchmarks
Trojan horses
user input constraints
VLSI
VLSI benchmarks
Title Adaptable and Divergent Synthetic Benchmark Generation for Hardware Security
URI https://ieeexplore.ieee.org/document/9256586
WOSCitedRecordID wos000671087100078&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZaxAALjxbxlgdG0iZ-xiOvigFVldqhW-XEZ4EQaRVSEP8eXxpKBxa2KIOV2Cffd_Z930fIFffOZ0L5iFsZRyJlLjIZdgJIDVIoyGLnarMJPRym06kZtcj1mgsDAHXzGfTwsb7Ld_N8iUdlfRPys0xVm7S1Viuu1k_soMydrKW3mmIr5E3VSPkkQva5wHBmPY4FC5r9bHip1KlksPe_j9gn3V9OHh2ts80BaUFxSHY35AQ75OnG2UWFXChqC0fvseUCmVN0_FUEnBdChN6GcZ7fbPlKV3rTuCw04FaKN_iftgQ6bgztumQyeJjcPUaNW0JkmdBVlLoEROK8TGPvVBZ-2jqZc5k7A9LbACNUQB8QyivmbeZ8Eqc-D-CEG9AZB35Etop5AceEGhU2QDCZ8DhKlhgNIHPBGKQAmrMT0sFpmS1WehizZkZO_359RnYY1qh4FMvOyVZVLuGCbOcf1ct7eVkv4jc83Z2e
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZKQQIWHi3ijQdG0iZ-JPHIqyqiVJXaoVvlxGeBEGkVUhD_Hl8aSgcWtiiDldgn33f2fd9HyCW3xiYitB7X0vdEzIynEuwEkBFIEULiG1OaTUT9fjweq0GNXC25MABQNp9BCx_Lu3wzTed4VNZWLj_LOFwj6-icVbG1fqIHhe5kKb5VlVsuc4aVmE8gZJsLDGjW4liyoN3PiptKmUw6O__7jF3S_GXl0cEy3-yRGmT7ZHtFULBBetdGzwpkQ1GdGXqHTRfInaLDr8whPRck9MaN8_ym81e6UJzGhaEOuVK8w__UOdBhZWnXJKPO_ei261V-CZ5mIiq82AQgAmNl7FsTJu6ntZEpl6lRIK12QCJ0-ANcgcWsTowN_NimDp5wBVHCgR-QejbN4JBQFbotEFQiLI6SBCoCkKlgDGKAiLMj0sBpmcwWihiTakaO_359QTa7o6fepPfQfzwhWwwrVjyYZaekXuRzOCMb6Ufx8p6flwv6DaP1oOc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Digest+of+technical+papers+-+IEEE%2FACM+International+Conference+on+Computer-Aided+Design&rft.atitle=Adaptable+and+Divergent+Synthetic+Benchmark+Generation+for+Hardware+Security&rft.au=Amir%2C+Sarah&rft.au=Forte%2C+Domenic&rft.date=2020-11-02&rft.pub=Association+on+Computer+Machinery&rft.eissn=1558-2434&rft.spage=1&rft.epage=9&rft_id=info:doi/10.1145%2F3400302.3415648&rft.externalDocID=9256586