19 Chandana Ys 4ad20ec012 Hardware Security PDF
19 Chandana Ys 4ad20ec012 Hardware Security PDF
19 Chandana Ys 4ad20ec012 Hardware Security PDF
A Seminar Report
On
Bachelor of Engineering
In
ELECTRONICS AND COMMUNICATION ENGINEERING
For the Academic Year 2023-24
Submitted By
CHANDANA Y S: 4AD20EC012
Under the Guidance of
Mr. Chandrashekar P
Assistant Professor
Dept. of ECE
CERTIFICATE
This is to Certified that the Internship work entitled “Hardware Security of AIML” carried
out by CHANDANA Y S [4AD20EC012] student of ATME College of Engineering, Mysuru
in partial fulfillment for the award of Bachelor of Engineering in Electronics and
Communication Engineering, of the visvesvaraya Technological University, Belagavi during
the year 2023-24. It is certified that all corrections/suggestions indicated for Internal
Assessment have been incorporated in the Report deposited in the departmental library.
The Technical Seminar report has been approved as it satisfies the academic requirements in
respect of Internship work prescribed for the said Degree.
…………………….
….………………..
Signature of Guide Signature of HOD
Mr. Chandrashekar p Dr. L Basavaraj
Asst professor Professor & HOD
Technical seminar
To develop highly skilled and globally competent professionals in the field of Electronics and
Communication Engineering to meet industrial and social requirements with ethical
responsibility.
MISSION
To have the capability to understand and adopt the technological advancements with the usage
of modern tool to analyze and design embedded system or processes for variety of applications.
To work effectively in a group as an independent visionary, team member and leader having
the ability to understand the requirement and develop feasible solutions to emerge as potential
core or electronic engineer.
ACKNOWLEDGEMENT
The satisfaction and euphoria that accompany the successful completion of any task
would be incomplete without mentioning the people who made it possible and under whose
constant guidance and encouragement the task was completed. I would like to express my
immense gratitude to Dr. L Basavaraj, Principal, ATMECE, Mysuru for his timely help and
inspiration during the tenure of the course.
I would like to express our deep gratitude to Dr. L Basavaraj, Professor and Head,
Department of Electronics and Communication Engineering, ATMECE, Mysuru for her timely
co-operation while carrying the technical seminar. Her friendliness made us learn more.
I would like to express our sincere thanks to the guide Mr. Chandrashekar p, Assistant
Professor, Department of Electronics and Communication Engineering, ATMECE, Mysuru for
their guidance, encouragement and suggestions that helped me a lot in completion of the
technical seminar.
I also extend our sincere thanks to the technical seminar evaluation committee members --
-Dr. Prakash Kuravatti and Mr. Girish M, and all the faculty members, Department of
Electronics and Communication Engineering, ATMECE, Mysuru who have encouraged me
throughout the course.
Last but not the least, I express our heartfelt gratitude to Almighty, my parents for their
love and blessings that helped us complete the technical seminar work successfully.
i
ABSTRACT
Hardware security and trust have become a pressing issue during the last two
decades due to the globalization of the semiconductor supply chain and ubiquitous network
connection of computing devices. Computing hardware is now an attractive attack surface for
launching powerful cross-layer security attacks, allowing attackers to infer secret information,
hijack control flow, compromise system root-of-trust, steal intellectual property (IP), and fool
machine learners. On the other hand, security practitioners have been making tremendous
efforts in developing protection techniques and design tools to detect hardware vulnerabilities
and fortify hardware design against various known hardware attacks. This article presents an
overview of hardware security and trust from the perspectives of threats, countermeasures, and
design tools. By introducing the most recent advances in hardware security research and
developments, we aim to motivate hardware designers and electronic design automation tool
developers to consider the new challenges and opportunities of incorporating an additional
dimension of security into robust hardware design, testing, and verification. Although ML
based solutions address the efficient computing requirements ofbig data, they introduce (new)
security vulnerabilities into the systems, which cannot be addressed by traditional monitoring
based security measures. Therefore, this paper first presents a brief overview of various
security threats in machine learning, their respective threat models and associated research
challenges to develop robust security measures.
ii
CONTENTS
ChapterNo. Title Page
1.1 Overview 03
1.4 Objective 03
Behavior Monitoring
hardware
directions
primitives
3.7 Advantages 22
3.8 Disadvantages 24
3.9 Application 25
iii
LIST OF FIGURES
no.
iv
HARDWARE SECURITY OF AIML
Chapter 1
INTRODUCTION
There have been numerous advances in artificial intelligence (AI) and machine learning (ML)
in recent years, including the rise of deep learning (DL) as applied to fields throughout
electronic design, from the system-level , through logic-level design , physical design , and test
and validation .Hardware security remains an important area of study, given the fundamental
role played by hardware in securing systems . Research in hardware security spans many
facets, including understanding and mitigating vulnerabilities in the integrated circuit
(IC)supply chain; counter acting overbuilding, counterfeiting, engineering effort; side-channel
attacks; and Hardware Trojans .
In addition to securing hardware itself, broader system security properties can be enhanced by
hardware for security, for example, the use of hardware performance counters(HPCs) for
identifying malicious behavior and physically functions (PUFs) for implementing
authentication, digital rights management, and other similar applications .As AI/ML continues
to mature, their impact on various domains continues to grow, including the Internet-of-
Things(IOT) and cyber-physical system (CPS) applications.
The cyber security community is exploring potential uses for AI/ML in detecting bugs,
modeling threats, and supporting defender decision-making. Furthermore, AI techniques can
supplement existing techniques, e.g., AI can guide fuzz testing of software for security risks.
Likewise, the evolution AI/ML has implications for hardware security.
To this end, we explore, intersections between AI/ML and hardware security, both in terms of
hardware for security and security of hardware. Our aim is to provide a perspective on
potential frontiers for research at these crucial junctions. In present a snapshot of existing
challenges in hardware security and outline opportunities and threats offered by AI/ML. Some
avenues are well-explored in the literature while others, such as understanding the implications
AI/ML techniques in the IC design flow, provide new areas for exploration. Besides, AI/ML
has several challenges that need to be considered by hardware security practitioners, including
the design of appropriate data representations and collecting quality training data. There are
many ways in which AI/ML is affecting hardware security, thus offering new directions to
Page 1
HARDWARE SECURITY OF AIML
explore. This paper is as follows. First, we provide an overview of recent research threads in
hardware for security, such as how AI/ML has been used for benevolent and malevolent
purpose.
IC supply chain. From this overview of the interplay between AI/ML and hardware security,
we adopt a speculative perspective and pose new directions and challenges. Although various
threats challenge the security of IOT, the root of trust starts from the hardware security. For
instance, attacks, like Boot kit malware that corrupts the boot-up sequence to load and execute
hostile codes, cannot be detected by software-level countermeasures. Without trusted and
authenticated devices, high-level approaches such as data encryption and code authentication
cannot thwart tampering. Therefore, hardware security is the primary focus of this paper. The
remainder of this paper is organized as below. introduces typical hardware attacks. , we
propose a dynamic permutation method for the IoT processing unit to simultaneously thwart
hardware Trojan and side channel analysis attacks. We further explain this method in detail
with a case study on a router.
Although various threats challenge the security of IOT, the root of trust starts from the
hardware security. For instance, attacks, like Boot kit malware that corrupts the boot- up
sequence to load and execute hostile codes, cannot be detected by software-level
countermeasures. Without trusted and authenticated devices, high-level approaches such as
data encryption and code authentication cannot thwart tampering. Therefore, hardware security
is the primary focus of this paper. The remainder of this paper is organized as below.
introduces typical hardware attacks. we propose a dynamic permutation method for the IOT
processing unit to simultaneously thwart hardware Trojan and side channel analysis attacks.
We further explain this method in detail with a case study on a router.
Hardware security threats can arise during various stages of the entire semiconductor life
cycle, ranging from specification to fabrication and even recycling. They can result from un
intentional design flaws, system side effects and intended malicious design modifications.
They usually target security assets, such as cryptographic functions, secure architectures,
intellectual property (IP), and machine learning (ML) models. While classic hardware security
threats, such as covert and side channels, hardware Trojans, and reverse engineering (RE), are
constantly evolving, recent powerful attacks exploit remote cross layer and specification-
compatible attack surfaces to compromise strong cryptographic primitives, isolation
Page 2
HARDWARE SECURITY OF AIML
1.1 OVERVIEW
Hardware security for AI/ML systems involves a comprehensive approach to safeguarding the
physical components and infrastructure crucial for their operations. This encompasses severa
key areas such as secure hardware design, supply chain integrity, physical security measures,
mitigation of side-channel attacks, hardware-based authentication, and secure data handling
mechanisms. Secure hardware design ensures that components are resilient to tampering and
unauthorized access, employing techniques like secure boot processes and hardware-based
encryption. Verifying the integrity of components throughout the supply chain is vital,
utilizing cryptographic signatures and working with trusted suppliers to prevent malicious
insertions. Physical security measures protect against theft and tampering, while techniques
like masking and noise injection mitigate side-channel vulnerabilities. Hardware-based
authentication ensures only authorized access, and robust data handling mechanisms safeguard
sensitive AI/ML data. Together, these measures form a comprehensive framework for ensuring
the security and integrity of hardware in AI/ML systems. Moreover, secure data handling
mechanisms play a crucial role in protecting sensitive AI/ML data. This includes encryption of
data at rest and in transit, access control policies, data anonymization techniques, and regular
audits to ensure compliance with security standards and regulations. Together, these measures
form a robust framework for hardware security in AI/ML systems, addressing various threats
and vulnerabilities throughout the lifecycle of hardware components and infrastructure.
1.2 OBJECTIVE
The objectives of hardware security for AI/ML systems are multi-faceted and aim to ensure
the
confidentiality, integrity, and availability of the hardware components and infrastructure
supporting these systems. Here are the main objectives:
Page 3
HARDWARE SECURITY OF AIML
1. Protecting sensitive AI/ML data and algorithms from unauthorized accessor disclosure.
This involves implementing encryption mechanisms, access controls, and secure
communication protocols to prevent data breaches or leakage of confidential information.
2. Ensuring the integrity of hardware components and data throughout their life cycle. This
includes measures such as secure boot processes, hardware attestation, tamper detection
mechanisms, and regular integrity checks to detect and mitigate tampering or unauthorized
modifications.
3. Ensuring that AI/ML systems and their hardware components are available and
operational when needed. This involves implementing redundancy, failover mechanisms ,and
disaster recovery plans to mitigate the impact of hardware failures, physical attacks, or other
disruptions.
4. Implementing strong authentication mechanisms at the hardware level to verify the
identity of users or devices accessing the AI/ML systems. Access control policies ensure that
only authorized entities have the necessary permissions to interact with the hardware
components and data.
5. Identifying and mitigating potential threats and vulnerabilities that could compromise
the security of hardware components or the AI/ML infrastructure. This includes addressing
risks such as supply chain attacks, physical tampering, side-channel attacks, and unauthorized
access attempts.
6. Adhering to regulatory requirements, industry standards, and best practices for hardware
security in AI/ML systems. This includes conducting regulars audits, implementing security
controls, and maintaining documentation to demonstrate compliance with relevant security
standards and regulations.
Page 4
HARDWARE SECURITY OF AIML
Chapter 2
LITERATURE SURVEY
This section describes about the work done on hardware security of ALML concepts by other
researchers.
Page 5
HARDWARE SECURITY OF AIML
Design Automation (EDA) field. However, due to the lack of supporting tools, only a few
existing works apply graph learning to resolve hardware security issues
[3] F. Wijitrisnanto, S. Sutikno and S. D. Putra, "Efficient Machine Learning Model for
Hardware Trojan Detection on Register Transfer Level," 2021 4th International
Conference on Signal Processing and Information Security (ICSPIS), Dubai, United Arab
Emirates, the RTL level was proposed by Choo et al. They designed ML detection technique
using four branching circuit features. These techniques were performed using some models:
decision tree, logistic regression, SVM, and k-nearest neighbor with an average True Positive
Rate (TPR) of 93.72%. The dataset used in that training model was an artificial one created
using the Adaptive Synthetic Sampling (ADASYN) algorithm which inputs are from AES
Trust-Hub benchmark. As result, the data does not fully represent the original benchmark.
Also, the extraction of four features is a complex and inefficient process.
[5] Member, IEEE, Chip-Hong Chang, Senior Member, IEEE Swarup Bhunia Senior
Member, IEEE, Ryan Kastner, Senior Member, IEEE, and Hai Li ‘‘An Overview of
Hardware Security and Trust: Threats, Countermeasures, and Design Tools,’’ Hardware
security and trust have become a pressing issue during the last two decades due to the
globalization of the semiconductor supply chain and ubiquitous network connection of
Page 6
HARDWARE SECURITY OF AIML
computing devices. Computing hardware is now an attractive attack surface for launching
powerful cross-layer security attacks, allowing attackers to infer secret information, hijack
control flow, compromise system root-of-trust, steal intellectual property (IP), and fool
machine learners. On the other hand ,security practitioners have been making tremendous
efforts in developing protection techniques and design tools to detect hardwarvulner abilities
and fortify hardware design against various known hardware attacks.
[6] Faiq Khalid, Muhammad Abdullah Hanif , Semeen Rehman,, Muhammad Shafique”
Security for Machine Learning-based Systems: Attacks and Challenges during Training
and Inference” 2018 International Conference The exponential increase in dependencies
between the cyber and physical world leads to an enormous amount of data which must be
efficiently processed and stored. Therefore, computing paradigms are evolving towards
machine learning (ML)-based systems because of their ability to efficiently and accurately
process the enormous amount of data.
[7] J. Bian et al., "Machine Learning in Real-Time Internet of Things (IoT) Systems: A
Survey," in IEEE Internet of Things Journal, 1 June 1, 2022, The cost of a deadline (required
time constraint) missed by ML/DL algorithms would be catastrophic in these safety-critical
systems. However, ML/DL algorithm-based applications have more concerns about accuracy
than strict time requirements. Accordingly, researchers from the real-time systems (RTSs)
community address the strict timing requirements of ML/DL technologies to include in RTSs.
This article will rigorously explore the state-of-the-art results emphasizing the strengths and
weaknesses in ML/DL-based scheduling techniques, accuracy versus execution time tradeoff
policies of ML algorithms, and security and privacy of learning.
[8] E. Rajesh and U. Sapra, "Design, build, and analyse hardware-based security
primitives that work well," 2022 International Interdisciplinary Humanitarian Conference for
Sustainability (IIHC), Bengaluru, India, 2022 . Hardware security has drawn more and more
attention in both academia and business over the past two decades. Flash memory has received
attention recently due to the debate over whether or not it can serve a security purpose. Flash
memory modules have been suggested as sites for hardware security primitives because of
Page 7
HARDWARE SECURITY OF AIML
their intrinsic process diversity, which can offer a distinctive fingerprint for a device. These
primitives include true random number generators (TRNGs), physical unlovable functions
(PUFs), and integrated circuit (IC) counterfeit detection Hardware-based security primitives
are essential for preserving and securing a system in AIML applications.
Page 8
HARDWARE SECURITY OF AIML
platforms translates to verifying there are no known security exploits present in the run-time
[12] Z. Li, Z. Huang, J. Wang and Q. Wang, "Investigate of Mitigation Solution against
Hardware Trojans Attack on Evolvable Hardware Platform," 2022 19th International SoC
Design Conference ,Gangneung-si, Korea, Republic of, 2022. An evolvable hardware platform
(EHWP) based on programmable devices can realize specific hardware function structures by
changing the bit-streams. As EHWP becomes more and more widely used in security chips,
issues related to hardware security have received focused attention, especially hardware
Trojans (HTs). However, current research has focused on implementing defense against HTs
in the underlying hardware, with very sparse mitigation solutions for HTs in the
overlay/middleware layer.
Page 9
HARDWARE SECURITY OF AIML
Chapter 3
3.1 METHODOLOGY
Hardware is typically assumed to be the root-of-trust for computer systems, where the
stability that comes from committing functionality to silicon is assumed to provide a strong
foundation for comparatively vulnerable, flexible software. As such, there are numerous
hardware-based approaches for enhancing security, including security primitives, such as
PUFs and cryptographic accelerators, that are included as part of an overall security
architecture. AI/ML intersect with these techniques constructively and destructively.
Defenders can use AI/ML with hardware-based observations to build models of an IC’s
operation for attack detection (in terms of software, hardware, and environmental conditions).
Attackers can use AI/ML to extract sensitive information from an IC, breaking trust
assumptions in hardware security.
Page 10
HARDWARE SECURITY OF AIML
Page 11
HARDWARE SECURITY OF AIML
design flow. As we will now discuss, AI/ML can be used to aid designers throughout the
design flow—for the targeted security-centric application of hardware Trojan detection, and
also more broadly throughout the entire hardware design flow. We also briefly touch on the
topic of hardware for AI/ML for completeness, as this is, in itself, an interesting intersection of
AI/ML and security of hardware.
One of several mature areas in hardware security is that of hardware Trojans (HTs),
maliciously inserted functionality that is triggered during run-time. Attackers can insert HTs at
various stages of the design flow
and typically represent very small changes to area, timing delay, and other design
characteristics. Despite their stealthy nature, several AI/ML based approaches have shown
good success at HT detection in gate-level net
lists. Typically, these approaches involve training and evaluation of ML models using
benchmarks sourced from Trust-Hub. Applying AI/ML techniques successfully is not a trivial
pursuit however, as defenders must
first identify an appropriate input representation for a design—unlike images, which are easily
represented as Multi dimensional matrices, appropriate circuit representations are more
challenging to produce. the authors
propose features based on net characteristics, including elements like the number of gates in
target net’s fan.
propose features based on net characteristics, including elements like the number of gates in
target net’s fan or the target net’s distance to the nearest multiplexer. We direct readers to for a
survey of ML-based HT detection.
The above Fig 3.1 shows the Hardware security threats can arise during various stages of the
entire semiconductor life cycle, ranging from specification to fabrication and even recycling.
They can result from unintentional design flaws system side effects .and intended malicious
design modifications.
Page 12
HARDWARE SECURITY OF AIML
An emerging development in the literature is the use of AI/ML techniques in the hardware
design flow. For example, researchers have applied DL techniques at various design
abstractions and design stages, including system-level prediction of hardware overhead, logic
optimization, routing, and test point insertion. These efforts represent new approaches for
handling scalability challenges and improving design turnaround time. illustrates a typical
iterative design stage with DL-in-the-loop, where DL models are used to support decision-
making and design space exploration.
However, while these techniques claim state-of-the-art performance, the implications for
hardware security, in light of un trusted supply chains and malicious insider threats, remains
ripe for exploration. Where defenders can use AI/ML to detect security issues (as in the
previous example with HTs), recent work has shown that adversaries can also abuse AI/ML in
the design flow. In an adversary subverts DL-based lithographic hot spot detection by means
of “semantically meaningful” adversarial input perturbations, where attackers insert sub
resolution assist features (SRAFs) to trick the hotspot detector into making bad predictions.
This points to a larger concern for AI/ML robustness, at least in terms of AI/ML and its
growing role in hardware design. More recently, the authors of demonstrate the potential for
training data poisoning attacks that introduce “backdoors” into DL-based hotspot detectors.
During design, a malicious insider can coerce the hotspot detector into turning a blind eye to a
hotspot-containing layout clip, despite its high-accuracy under benign settings. Nefariously,
Page 13
HARDWARE SECURITY OF AIML
poisoning involves adding layout clips that are honestly labeled and are thus near impossible
to identify ahead of time as a result. To address these potential attacks, recent work attempts
application-informed defenses where data is meaningfully transformed in such a way as to
reduce the Back dooring effect. If the security of hardware relies on all parts of the supply
chain being properly safeguarded, AI/ML in the design flow may add new attack targets and
vectors, and likewise, will require new analyses and defenses.
For completeness, it is also worth considering the intersection of hardware security and
hardware for AI/ML, particularly as AI/ML hardware make their way into cloud-based, IOT,
and CPS application domains. Various AI/ML techniques are susceptible to adversarial
settings. When realized as hardware, such robustness weaknesses can translate into new attack
vectors such as memory-based HTs fault attacks and cloud-center interference. As AI/ML
evolves and becomes more prevalent in different domains, new requirements for hardware
security may also emerge.
illustrate examples of the benevolence and malevolence of AI/ML. On one hand, defenders
can use AI/ML to monitor and discover stealthy attacks by using hardware-enabled
observation, building models that are able to identify anomalies. Conversely, attackers can also
use the same techniques to build models that allow them to infer sensitive information. For
defenders, hardware security relies on gathering knowledge in adversarial contexts and finding
ways to withhold knowledge to meet security goals. With this in mind, new research directions
include:
Run-time Decision Making and Response: As we saw AI/ML used for behavior monitoring,
the next step could involve generating active responses. At run-time, hardware based security
systems should perform mitigations (for example, isolation of attacked components or
spinning up redundancies).Can AI/ML systems make decisions as to which course of action to
take to preserve system integrity or overcome an attack? Building along this avenue could be
Page 14
HARDWARE SECURITY OF AIML
1. Secure Boot Attacks: A secure boot starts by loading code from an immutable boot
ROM, correctly initializing critical peripherals, configuring security and system settings,
authenticating and properly loading boot images and application code, and properly sanitizing
data upon reset. Many issues arise due to the system being configured incorrectly, e.g., system
memory space not protected. Other issues relate to data not being properly erased (e.g.,
keyboard strokes stay in buffers). These and many other real-world secure boot attacks are
documented by Bulygin et al.
The secure boot process is fairly well documented making it amenable to formal property
Page 15
HARDWARE SECURITY OF AIML
specification Such properties relate to isolation and access control between boot stages (e.g.,
the next stage can only access a limited subset of the previous stage information), determining
if a boot stage completes fully before continuing to the next stage and protecting boot state
information properly upon completion (e.g.,it cannot be modified and can only be read from
boot code). Additionally, there should be a sequence that causes the hardware to fully reset all
data, code, configuration, and any other state, and the system should only load from the boot
ROM upon reset.
2. Firmware Attacks: Firmware is the low-level software that controls the interaction and
behavior of a piece of hardware or IP core. Firmware plays a key role in determining the
security of SOC. Incorrectly setting configuration registers can lead to catastrophic
consequences and open the door to leaking confidential information, unsafe behaviors, and
critical flaws that can be exploited by attackers. An analysis in 2014 showed that at least 140
000 devices had a firmware vulnerability. This should not be too surprising as determining the
correctness of the firmware is challenging as each hardware core has different configurations
that interact with the overall system in a nonobvious manner. Firmware is particularly
important for SoC architectures. Modern SoC architectures are a patchwork of hundreds,
sometimes thousands, of different IP cores that are cobbled together from in-house sources,
outside vendors, and opensource good motivation and the early work in this space. Device
drivers are typically small, but important pieces of low-level C or assembly code that play an
important role in firmware security.
They provide an application program interface (API) that is used to deliver data to/from a
device, query the status of the device, or set the device mode. More often than not, device
drivers require access to critical parts of the system and thus it is crucial that they execute
efficiently, handle real-time constraints. The first step toward synthesizing correct, efficient,
and secure device drivers is to create properties around on-chip communication protocols, such
as advanced extensible interface (AXI) and Wish bone .
3. Dynamic Random Access Memory Threats: The Cold boot and Row hammer attacks
demonstrate the importance of protecting sensitive data stored in dynamic random access
memory (DRAM). Cold boot exploits the physical phenomenon that DRAM data persist for a
short amount of time even after powering off the memory. This time can be extended by
cooling down the memory, which further reduces the leakage of current from the DRAM
Page 16
HARDWARE SECURITY OF AIML
capacitors. Researchers used this idea to show how to remove a DRAM from one computer,
place it into another, and grab the data. Other malicious attacks are also possible. Row hammer
exploits another physical vulnerability of DRAM, this time using the fact that DRAM data can
be altered by accessing nearby data. The attacker locates some of their data next to some
critical data in DRAM. By changing the values of their data, the attacker induces circuit noise
that causes the target sensitive data to change.
4. Cache Attacks: Cache attacks exploit information leakage through cache state and are
extremely effective at extracting protected information. The cache is a shared resource and any
process that uses it can leave traces about their computation, in particular, the memory
addresses they accessed.
Cache timing attacks can be categorized as time driven and access driven. A time-driven attack
measures the execution time of the victim process. The attacker manipulates the contents of a
shared cache and observes the timing of another process (e.g., a cryptographic operation). The
timing is effected by cache hits and misses, which provides information about the key. An
access-driven attack extracts information by measuring the time that it takes the attacker to
perform a cache access.. If a particular cache line is accessed by the victim process, the
attacker would observe a cache hit and vice versa. For instance, an attacker can identify data
access patterns by the victim (e.g., which S-Box entries are being accessed during AES
execution) and use this information to extract the confidential information (e.g., the secret
key). Cache side channel is a powerful attack that is often used in combination with other
attacks, e.g. Meltdown and Spectre, as we will discuss.
5. Speculative Execution Attacks: Meltdown and Spectre are the first of a series of
attacks that leverage speculative execution, out of order execution, aching, and other
architectural performance enhancements to break isolation and other security policies. Melt
down enables unauthorized processes to read data from any address that is mapped to the
current process’s memory space. Meltdown exploits a race condition where the unauthorized
process attempts to access privileged data. A privilege check eventually squashes the
execution of that code, but not before the data are temporarily loaded into cache. The attack
then uses a cache side-channel attack (SCA) to determine contents of the data. Spectre is a
vulnerability that tricks a victim process to leak its data. Many processors perform speculative
execution by branch prediction. Spectre uses the fact that this specultive code leaves traces of
Page 17
HARDWARE SECURITY OF AIML
its execution in the cache whose information can be extracted using a cache SCA (similar to
Meltdown). Spectre trains a branch predictor to make a wrong decision and then wraps code
that should not be executed in a condition. The code is speculatively executed since the branch
predictor is wrong. It eventually gets squashed but it leaves important information in the cache
state, which is extracted via a cache SCA.
6. Code Reuse Attacks: Code reuse attacks carefully use existing snippets of software to
perform computation of the attackers’ choosing. Return-oriented programming (ROP) is an
example of code reuse attack where existing code fragments (or gadgets) are carefully
sequenced to perform a malicious act. The attacker’s goal is to divert the control flow by
gaining control of the call stack and invocating the first nogadget, which in term calls
subsequent gadgets. This allows the attacker to perform actions of their choosing.
Page 18
HARDWARE SECURITY OF AIML
Conventional jitter-based TRNGs use a slower jittery frequency clock to sample a faster clock.
Using clock jitters of free running ring oscillators (ROs) as entropy source, the extractor
design can be simplified, but additional power-hungry clock generators are required to provide
adequate jitter variations. Yang et al. proposed a process variation tolerant TRNG by
exploiting the oscillation collapse in a double edge injected RO. To achieve the robustness
Page 19
HARDWARE SECURITY OF AIML
against process variations, 32 stages with eight selectable inverters per stage are used to
provide the tuning space. Recently, a lightweight TRNG consisting of only two 9-stage
current-starved ROs (CSROs) with an identical layout, a 3-stage regular RO, and a 2-b counter
was proposed. In order to maximize jitters and reduce power consumption, the inverters in the
two CSROs are biased in the weak inversion region and the inverters in the regular RO are
operating in the strong inversion region. Systemic biases in the beat frequency are effectively
canceled out by XORing the outputs of the two matched CSROs. The resulting random pulse
width is used to clock gate the regular inverter-based RO to the 2-b counter. This jitter-based
TRNG, fabricated in a standard 65 nm, 1.2-V CMOS process, consumes only 260 μW at a bit
rate of 52 Mb/s and has a small footprint of 366 μm2.
Metastability is a stable state of a dynamical system besides the system’s state of least energy.
Metast abilities in cross coupled inverters, latches, DFFs, and SRAMs [112] have been utilized
to produce random bit streams at high bit rate, but complex postprocessing units are usually
required to eliminate the systematic bias. The key component of metastability-based TRNG of
is the metastability latch, which is designed based on a cross-coupled inverter pair with equal
rise and fall time. A random bit is produced by the metastability latch in each cycle. To assure
high entropy, a time-to-digital converter (TDC) is used to measure the settling time and tune
the metastable latch against bias introduced by the process and temperature variations. The
switching speed of the metastability latch cannot be too fast to prevent the settling time from
exceeding the time resolution of the TDC. The latch size and load must also preserve the
dominance of thermal noise over flicker noise. By combining three entropy sources of similar
cross-coupled inverter pairs that share the same supply and clock, Intel fabricated a fast
TRNG in 14-nm FinFET CMOS process that produces three full-entropy bits per clock cycle.
The three bitstreams of at least 0.33 min-entropy/bit each are combined by a Barak–
Impagliazzo–Wigderson (BIW).
Correlation suppressors and undersampled feedback shift registers are used to decorrelate and
whitening the raw data to generate 24 uncorrelated bits in every 64 clock cycles with an ultralow
energy consumption of 3 pJ/bit. TRNGs can also
be designed from the chaotic system described by deterministic equations. At first sight, this may
sound like God plays dice with complete law and order. Being extremely sensitive to the initial
conditions, the disorder states of a chaotic system are very hard to be modeled mathematically even
Page 20
HARDWARE SECURITY OF AIML
though they are produced by simple systems that obey precise rules. Chaos is, as described by the
legendary Lorenz, “when the present determines the future, but the approximate present does not
approximately determine the future” . Chaos-based TRNGs are typically designed by a chaotic map
and a bit generation function. Unfortunately, the map characteristics are susceptible to process, voltage,
and temperature (PVT) variations. The optimal bit generation function for achieving the highest
possible entropy rate from a map function is costly to implement, and consumes great power. An
exceptionally energy-efficient implementation is shown in Fig. 2. It consists of a 10-b fine-SAR ADC,
a 5-b coarse-SAR ADC, a dynamic residue amplifier, and an XOR postprocessing block.
The ADC recursively amplifies the initial state of the system with environmental noise to produce a
discrete time chaotic map. Due to quantization errors of the coarse-SAR ADC, the design is highly
sensitive to the initial state. The switching power of fine-SAR ADC is reduced by using the coarse-
SAR ADC to detect and skip switching. The design consumes only 82 nW of power and 0.3 pJ/b of
energy. A larger portion of the power savings are due to the dynamic residue amplifier and adaptive
reset comparator. As the need for publicly auditable randomness from applications, such as elections
and lotteries, increases, so is the demand for randomness beacon. A randomness beacon is a public
server that produces completely unpredictable bit strings at regular intervals. During the Crypto Week
last year, a new public randomness beacon called “League of Entropy” [117] was released by the
American Webinfrastructure and website-security titan company Cloudflare. Built upon the provably
secure cryptographic architecture of drand [118], this is a network of beacons run by a consortium of
global organizations and individual contributors to provide publicly verifiable, decentralized random
Page 21
HARDWARE SECURITY OF AIML
outputs. Interestingly, Cloudflare actually sources her entropy from a video of a wall of lava lamps.
These unpredictable visual data of floating blogs are converted to truly random numbers. Most
recently, truly random numbers were also created from growing crystals.
3.7 ADVANTAGES
Page 22
HARDWARE SECURITY OF AIML
organizations can ensure long-term protection against emerging cyber security risks and
vulnerabilities. Overall, hardware security plays a crucial role in building trustworthy and
resilient AI/ML systems, offering a combination of performance optimization, data privacy
protection, and defense against cyber threats.
8. Real-Time Processing: Hardware-based security can enable real-time processing of
security-related tasks, such as anomaly detection or threat mitigation, without significantly
impacting the performance of AI/ML algorithms. This real-time capability is essential for
detecting and responding to security threats promptly. Energy Efficiency: Some hardware
security solutions are designed to be energy-efficient, consuming minimal power while
providing robust security features. This is particularly beneficial for battery-powered AI
devices or IOT (Internet of Things) devices running AI/ML applications.
9. Hardware Root of Trust: Hardware security often incorporates a "root of trust"
mechanism, which establishes a secure foundation for the entire system. This root of trust
ensures that critical security functions, such as secure boot, firmware verification, and key
management, are performed in a trusted environment.
Page 23
HARDWARE SECURITY OF AIML
3.8 DISADVANTAGES.
Page 24
HARDWARE SECURITY OF AIML
support, or product availability could impact the long-term security and maintenance of AI/ML
systems.
3.9 Application
Securing hardware for AI and machine learning (ML) systems involves several critical aspects.
Here are some key considerations and methods:
Secure Boot and Firmware: Implement secure boot mechanisms to ensure that only trusted
firmware and software components are loaded during system startup. This prevents
unauthorized modifications and ensures the integrity of the system.
Hardware Encryption: Utilize hardware-based encryption engines for data at rest and data in
transit. This adds an extra layer of security by encrypting sensitive data and preventing
unauthorized access.
Trusted Execution Environments (TEE): TEEs provide isolated execution environments for
critical processes, such as model inference, key management, and authentication. This helps
protect sensitive operations from external attacks. Secure Storage: Use hardware-based secure
storage solutions, such as Trusted Platform Modules (TPM), to store cryptographic keys,
credentials, and other sensitive data securely.
Page 25
HARDWARE SECURITY OF AIML
security issues.
Access Control: Implement strong access control measures, including role-based access
control (RBAC) and multi-factor authentication (MFA), to ensure that only authorized users
and devices can access sensitive resources.
Security Auditing and Monitoring: Implement logging, monitoring, and auditing
mechanisms to detect and respond to security incidents in real-time. This includes anomaly
detection, intrusion assessments, and code reviews, to identify and mitigate security risks
throughout the development lifecycle.
By integrating these hardware security measures into AI and ML systems, you can enhance the
overall security posture and mitigate potential risks and threats effectively.
Page 26
HARDWARE SECURITY OF AIML
CONCLUSION
Hardware security involves multiple levels of abstraction in the computing system stack. In
view of the enormously broad focus and attractivity of this field, it is not possible to
comprehensively survey the voluminous publications, multidisciplinary and vast diversity of
problems and solutions. In this article, we surveyed and discussed the recent advances in
selective subfields of hardware security.Specifically, we presented attacks and
countermeasures on secure architectures, IP components, and DNN models, as well
as the design and niche applications of two popular hardware- intrinsic security primitives. We
also outlined recent efforts in developing security-driven hardware design tools. Hardware
attacks and countermeasures are rapidly evolving. It is not surprising that a different shortest
bar of the wooden barrel can be identified with each major change in processor architectures
and computing technologies. We believe that the rally between hardware attack and defense
will remain a vibrant presence for a long time. It is, therefore, our aim that this review will
alert the hardware designers and tool developers to pay additional attention to significant
security gaps not addressable by traditional hardware design and verification methodologies.
Moreover, to analyze the security vulnerabilities for identifying the potential countermeasures,
we demonstrate some of the security threats (Training data poisoning and adversarial examples
(L-BFGS and FSGM)) on the Le Net and the VGG Net for the MNIST and the German Traffic
Sign Recognition Benchmarks (GTSRB), respectively. We also propose a training data
poisoning attack which has relatively less impact on inference accuracy. Finally, we provide
an overview of possible security measures and
highlight respective research challenges in developing these security measures.
FUTURE ENHANCEMENTS
Enhancing AI and ML hardware security systems involves a multifaceted approach. Secure
enclaves like Intel SGX or ARM Trust Zone can create isolated environments for sensitive
Page 27
HARDWARE SECURITY OF AIML
data and algorithms, shielding them from unauthorized access. Integrating tamper-resistant
features and sensors can detect physical tampering or intrusion attempts, bolstering the
system's resilience. Ensuring firmware integrity through secure boot processes and
cryptographic verification mechanisms prevents malicious modifications. Mitigating side-
channel attacks, implementing real-time monitoring for anomaly detection, using secure
communication protocols, enforcing regular updates and patching, incorporating multi-factor
authentication, implementing auditing and logging, and developing AI-based intrusion
detection systems collectively build a robust defense against various security threats, ensuring
REFERENCES
[1] M T. Ghazal, M. K. Hasan, R. A. Zitar, N. A. Al- Dmour, W. T. Al-Sit and S.
Islam, "Cybers Security Analysis and Measurement Tools Using Machine Learning
Approach," 2022Artificial intelligence (AI) and machine learning (ML)
[2] Y. Yu, R. Yasaei, Q. Zhou, T. Nguyen and M. A. Al Faruque, "HW2VEC: a
Graph Learning Tool for Automating Hardware Security," 2021
Page 28
HARDWARE SECURITY OF AIML
Page 29
HARDWARE SECURITY OF AIML
Page 30