LATENT: LLM-Augmented Trojan Insertion and Evaluation Framework for Analog Netlist Topologies
By: Jayeeta Chaudhuri, Arjun Chaudhuri, Krishnendu Chakrabarty
Potential Business Impact:
Finds hidden bugs in computer chips.
Analog and mixed-signal (A/MS) integrated circuits (ICs) are integral to safety-critical applications. However, the globalization and outsourcing of A/MS ICs to untrusted third-party foundries expose them to security threats, particularly analog Trojans. Unlike digital Trojans which have been extensively studied, analog Trojans remain largely unexplored. There has been only limited research on their diversity and stealth in analog designs, where a Trojan is activated only during a narrow input voltage range. Effective defense techniques require a clear understanding of the attack vectors; however, the lack of diverse analog Trojan instances limits robust advances in detection strategies. To address this gap, we present LATENT, the first large language model (LLM)-driven framework for crafting stealthy, circuit-specific analog Trojans. LATENT incorporates LLM as an autonomous agent to intelligently insert and refine Trojan components within analog designs based on iterative feedback from a detection model. This feedback loop ensures that the inserted Trojans remain stealthy while successfully evading detection. Experimental results demonstrate that our generated Trojan designs exhibit an average Trojan-activation range of 15.74%, ensuring they remain inactive under most operating voltages, while causing a significant performance degradation of 11.3% upon activation.
Similar Papers
TrojanLoC: LLM-based Framework for RTL Trojan Localization
Cryptography and Security
Finds hidden bad code in computer chips.
Automated Hardware Trojan Insertion in Industrial-Scale Designs
Cryptography and Security
Creates fake computer bugs to test security.
CacheTrap: Injecting Trojans in LLMs without Leaving any Traces in Inputs or Weights
Cryptography and Security
Makes AI models do bad things with tiny changes.