Adaptable and Divergent Synthetic Benchmark Generation for Hardware Security
Benchmarking can drive the development of technologies by facilitating standardization of features for comparison of different methods. While hardware security has seen an exponential growth in innovation throughout the last decade, the lack of sufficient benchmarks for data-driven analysis is promi...
Saved in:
| Published in: | Digest of technical papers - IEEE/ACM International Conference on Computer-Aided Design pp. 1 - 9 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
Association on Computer Machinery
02.11.2020
|
| Subjects: | |
| ISSN: | 1558-2434 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Benchmarking can drive the development of technologies by facilitating standardization of features for comparison of different methods. While hardware security has seen an exponential growth in innovation throughout the last decade, the lack of sufficient benchmarks for data-driven analysis is prominent. Researchers must currently rely on decades-old VLSI benchmarks, which in most cases were not designed with security evaluation in mind. Considering the present day computational power, these benchmarks lack in both quality and quantity for usage in hardware security topics such as obfuscation and hardware Trojans. Many advanced techniques, like statistical analysis and machine learning, require a large number of samples in order to sufficiently examine the feature space. In an attempt to resolve this issue, we have developed the first synthetic benchmark generation process flow. This paper describes our novel technique that utilizes linear optimization to generate an endless number of synthetic combinational benchmarks that are adaptable to user input constraints and divergent in quantifiable structural features from input reference benchmarks. Thus, our framework offers customization for generating richer and more challenging benchmarks for data-driven hardware security. Through experimentation, we verify that our benchmarks offers more structural variation than the current benchmark suites. |
|---|---|
| AbstractList | Benchmarking can drive the development of technologies by facilitating standardization of features for comparison of different methods. While hardware security has seen an exponential growth in innovation throughout the last decade, the lack of sufficient benchmarks for data-driven analysis is prominent. Researchers must currently rely on decades-old VLSI benchmarks, which in most cases were not designed with security evaluation in mind. Considering the present day computational power, these benchmarks lack in both quality and quantity for usage in hardware security topics such as obfuscation and hardware Trojans. Many advanced techniques, like statistical analysis and machine learning, require a large number of samples in order to sufficiently examine the feature space. In an attempt to resolve this issue, we have developed the first synthetic benchmark generation process flow. This paper describes our novel technique that utilizes linear optimization to generate an endless number of synthetic combinational benchmarks that are adaptable to user input constraints and divergent in quantifiable structural features from input reference benchmarks. Thus, our framework offers customization for generating richer and more challenging benchmarks for data-driven hardware security. Through experimentation, we verify that our benchmarks offers more structural variation than the current benchmark suites. |
| Author | Amir, Sarah Forte, Domenic |
| Author_xml | – sequence: 1 givenname: Sarah surname: Amir fullname: Amir, Sarah email: sarah.amir@ufl.edu organization: University of Florida,Gainesville,Florida,USA,32611 – sequence: 2 givenname: Domenic surname: Forte fullname: Forte, Domenic email: dforte@ece.ufl.edu organization: University of Florida,Gainesville,Florida,USA,32611 |
| BookMark | eNotj8FOAjEURavRRETWLtz0BwbbvtdOu0REMCFxAXvSmb5KIxZSqoa_l0RX96xOzr1lV3mfibF7KcZSon4EFAKEGgNKbdBesJFrrTRGowKFcMkGUmvbnBFv2Oh4TJ1AFKidtQO2nAR_qL7bEfc58Of0TeWdcuWrU65bqqnnT5T77acvH3xOmYqvaZ953Be-8CX8-EJ8Rf1XSfV0x66j3x1p9L9Dtn6ZraeLZvk2f51Olo1X2NbGBkkoQ9RWxGC68wcfdA-6D4509MqCMQjknFXRdyFKYWPvoAVHbQcEQ_bwp01EtDmUdI47bZzSRlsDv9I1UA4 |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1145/3400302.3415648 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781665423243 1665423242 |
| EISSN | 1558-2434 |
| EndPage | 9 |
| ExternalDocumentID | 9256586 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: NSF grantid: CNS 1651701 funderid: 10.13039/501100001809 |
| GroupedDBID | 6IE 6IF 6IH 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO FEDTE IEGSK IJVOP M43 OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-a247t-8d1e41df580fd6b145ad5c35cd9e5fa2836643e9982fabdf108fc93739e7b3e3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 6 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000671087100078&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:28:38 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a247t-8d1e41df580fd6b145ad5c35cd9e5fa2836643e9982fabdf108fc93739e7b3e3 |
| PageCount | 9 |
| ParticipantIDs | ieee_primary_9256586 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-Nov.-2 |
| PublicationDateYYYYMMDD | 2020-11-02 |
| PublicationDate_xml | – month: 11 year: 2020 text: 2020-Nov.-2 day: 02 |
| PublicationDecade | 2020 |
| PublicationTitle | Digest of technical papers - IEEE/ACM International Conference on Computer-Aided Design |
| PublicationTitleAbbrev | ICCAD |
| PublicationYear | 2020 |
| Publisher | Association on Computer Machinery |
| Publisher_xml | – name: Association on Computer Machinery |
| SSID | ssib044045988 ssj0020286 |
| Score | 2.1926177 |
| Snippet | Benchmarking can drive the development of technologies by facilitating standardization of features for comparison of different methods. While hardware security... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Benchmark testing circuit optimisation combinational circuits data-driven analysis data-driven hardware security exponential growth feature space Hardware hardware security input reference benchmarks invasive software linear optimization linear programming Logic gates machine learning Optimization quantifiable structural features Security security evaluation statistical analysis Synthetic benchmark synthetic benchmark generation process flow synthetic combinational benchmarks Trojan horses user input constraints VLSI VLSI benchmarks |
| Title | Adaptable and Divergent Synthetic Benchmark Generation for Hardware Security |
| URI | https://ieeexplore.ieee.org/document/9256586 |
| WOSCitedRecordID | wos000671087100078&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZaxAALjxbxlgdG0iZ-xiOvigFVldqhW-XEZ4EQaRVSEP8eXxpKBxa2KIOV2Cffd_Z930fIFffOZ0L5iFsZRyJlLjIZdgJIDVIoyGLnarMJPRym06kZtcj1mgsDAHXzGfTwsb7Ld_N8iUdlfRPys0xVm7S1Viuu1k_soMydrKW3mmIr5E3VSPkkQva5wHBmPY4FC5r9bHip1KlksPe_j9gn3V9OHh2ts80BaUFxSHY35AQ75OnG2UWFXChqC0fvseUCmVN0_FUEnBdChN6GcZ7fbPlKV3rTuCw04FaKN_iftgQ6bgztumQyeJjcPUaNW0JkmdBVlLoEROK8TGPvVBZ-2jqZc5k7A9LbACNUQB8QyivmbeZ8Eqc-D-CEG9AZB35Etop5AceEGhU2QDCZ8DhKlhgNIHPBGKQAmrMT0sFpmS1WehizZkZO_359RnYY1qh4FMvOyVZVLuGCbOcf1ct7eVkv4jc83Z2e |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZKQQIWHi3ijQdG0iZ-JPHIqyqiVJXaoVvlxGeBEGkVUhD_Hl8aSgcWtiiDldgn33f2fd9HyCW3xiYitB7X0vdEzIynEuwEkBFIEULiG1OaTUT9fjweq0GNXC25MABQNp9BCx_Lu3wzTed4VNZWLj_LOFwj6-icVbG1fqIHhe5kKb5VlVsuc4aVmE8gZJsLDGjW4liyoN3PiptKmUw6O__7jF3S_GXl0cEy3-yRGmT7ZHtFULBBetdGzwpkQ1GdGXqHTRfInaLDr8whPRck9MaN8_ym81e6UJzGhaEOuVK8w__UOdBhZWnXJKPO_ei261V-CZ5mIiq82AQgAmNl7FsTJu6ntZEpl6lRIK12QCJ0-ANcgcWsTowN_NimDp5wBVHCgR-QejbN4JBQFbotEFQiLI6SBCoCkKlgDGKAiLMj0sBpmcwWihiTakaO_359QTa7o6fepPfQfzwhWwwrVjyYZaekXuRzOCMb6Ufx8p6flwv6DaP1oOc |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Digest+of+technical+papers+-+IEEE%2FACM+International+Conference+on+Computer-Aided+Design&rft.atitle=Adaptable+and+Divergent+Synthetic+Benchmark+Generation+for+Hardware+Security&rft.au=Amir%2C+Sarah&rft.au=Forte%2C+Domenic&rft.date=2020-11-02&rft.pub=Association+on+Computer+Machinery&rft.eissn=1558-2434&rft.spage=1&rft.epage=9&rft_id=info:doi/10.1145%2F3400302.3415648&rft.externalDocID=9256586 |