top of page

AI Hardware Attack Challenge
US - Canada 

451709_Black background logo for artific

Previous Competition

It’s time to think a little differently about the capabilities of generative AI.

Using generative AI (e.g. ChatGPT, Bard, or similar) you will work to automate the insertion of hardware vulnerabilities, such as trojans or backdoors, into an open-source digital design of your choice (e.g. OpenTitan, Ariane, a design from OpenCores, etc.). The resulting vulnerabilities must be simulatable and synthesizable, and you will need to be able to demonstrate the effects of the added security vulnerability (e.g HW-CWE). A successful submission will need to include all the prompts and responses from the language model, a document detailing the automation procedure (your tool design, what existing tools you used, how to use your framework, etc.), detailed demonstrations of exploits, and your framework itself. Points will be awarded for subtle yet powerful exploits, creative AI usage, tool integration, and valid use-cases.

Previous Competition

Our previous competition criteria's

Judging criteria

Judging Criteria

- Usefulness of the open-source design - more popular / more broadly applicable designs are worth more

- Method for adding the vulnerability - all prompts and logs must be kept and provided, and the more that the LLM did the better, including changing of scripts and testbenches outside the hardware design itself.

- The severity of the vulnerability - e.g. theoretical CVSS score.

- The stealth of the vulnerability - how well does it hide in the overall design? Extra points for showing that it can hide from existing security scanners / functional tests / test benches.

- The vulnerability demonstration - it must be possible to observe the claimed impact of your vulnerability (e.g. via simulation).

- All entries must be completely open-source (using Apache license or compatible) but need not fully rely on open-source platforms (e.g. you can use ModelSim, Vitis, Synopsys etc.)

Round 1 Submission

The submission for Round 1 must include a detailed plan of action for adding your vulnerability(ies), your progress in that plan, an explanation of the potential impact of the bug(s), and any of your preliminary results including your current code and conversations

Round 2 Submission

The submission for Round 2 must include a detailed report explaining the
vulnerability(ies) added, simulation results, proposed exploits, and LLM
conversations.

Finalists should also prepare the following:
        - A 6-minute presentation for the judges, to be followed by a
          2-minute Q&A session.
        - A 24 x 36 inch poster to be presented during a poster session to
          both the judges and other CSAW participants



If submitting for the Efabless prize, the design must also be submitted to the CI 2311 shuttle: https://platform.efabless.com/projects/create?shuttle=CI+2311

 

2023 competition organizers

JUDGES

Judges
Awards

Awards

​Best hardware-based vulnerabilities:

First place $1000
Second place $750
Third place $500

Best hardware-vulnerability demonstration suitable for the Efabless ChipIgnite
Award: Free placement on Efabless ChipIgnite tapeout shuttle

Competition award sponsored by efabless

Purple - Blue Gradient

2023 Winners

RegionIcons_USCANADA.png
Winners

Thank you 

logo_500px.png
bottom of page