This research paper examines the vulnerability of Integrated Circuit (IC) supply chains to Hardware Trojans (HTs). The authors introduce a new approach to HT obfuscation that allows HTs to bypass Machine Learning (ML)-based detection methods. They explore methodologies for both ASICs and FPGAs, and demonstrate that adversarial power traces can fool defenses with 100% efficiency. The paper also discusses the limitations of countermeasures like spectral domain analysis and adversarial training in the face of such threats.

 

Publication date: 5 Jan 2024
Project Page: https://dev.d18uu4lqwhbmka.amplifyapp.com
Paper: https://arxiv.org/pdf/2401.02342