top of page
CSAW24_Logo_WHITE.png
Top of Page

AI-based Hardware Attack Challenge
US-Canada, MENA, India

US-Canada Region Sponsored By: NORDTECH

451709_Black background logo for artificial intelligence _xl-1024-v1-0_edited_edited.jpg
It’s time to think a little differently about the capabilities of generative AI for chip design.

Using generative AI (e.g. ChatGPT, Claude, Gemini, or similar) you will work to insert hardware vulnerabilities, such as Trojans or backdoors, into an open-source digital design of your choice (e.g. OpenTitan, Ariane, a design from OpenCores, etc.). The resulting vulnerabilities must be simulatable and synthesizable, and you will need to be able to demonstrate the effects of the added vulnerability (e.g Hardware CWE & CVSS score). A successful submission will need to include all prompts and responses from the language model, a document detailing your methodology, and detailed demonstrations of exploits. You may use and modify existing tools and frameworks as you see fit. Points will be awarded for subtle yet powerful exploits, creative AI usage, tool integration, and valid use-cases.

competition timeline

15 September 2024
7 October 2024
16 October 2024
18 October 2024
5 November 2024
6-9 November 2024
8-9 November 2024
Competition Launches
Instructional Webinar
Round 1 Submission deadline
Finalist Notification
Round 2 Submission deadline
CSAW
Contestant Final Presentations and Award Ceremony
Timeline
Methodology

Methodology

  1. Choose an open source chip-design project (e.g. OpenTitan, a design from OpenCores)

  2. Leveraging generative AI tools, do the following:

    1. Identify security assets

    2. Compromise via a bug insertion a chosen asset

    3. Design an exploit to use that compromise to perform an attack

    4. Basically: Create a bug and then exploit the bug!

  3. ​Document your methods for using AI to develop and insert these security bugs

Judging Criteria

Judging criteria

  1. Open-source:

    1. The design you add a vulnerability to must be open sourced, as well as any additional tooling you might choose to create to support your vulnerability insertion.

    2. While your design must be open-source, you may leverage non open-source platforms (e.g. you can use ModelSim, Vitis, Synopsys etc.) and LLMS (OpenAI, Anthropic, etc.)

  2. Creative AI Usage:

    1. A higher score will be given for more interesting or creative work: e.g. training an open-source LLM, creative or novel prompt engineering strategies, or developing a tool to automate bug insertion. This is intentionally very open-ended, so be creative!

  3. Usefulness of targeted design: 

    1. More popular / more broadly accessible designs will be worth more

  4. Vulnerability demonstration:

    1. The more vulnerabilities, the more points!

    2. Each vulnerability will be scored:

      1. End-to-end “logs” of the tool creating vulnerabilities

      2. Vulnerability creativity

      3. Vulnerability subtlety

      4. Severity of the vulnerability (e.g. theoretical CVSS score)

      5. Vulnerability exploits (e.g. in simulation or videos of reconfigurable HW)

  5. Documentation:

    1. Instructions to "reproduce" your results (i.e. your methodology)

    2. Insights into what went well, what was challenging, and any creative solutions you needed to work with the AI

Organizers

Organizers

Hammond Pearce
Global Faculty Lead
UNSW
Jason Blocklove
Global Student Lead
NYU
Prithwish Basu Roy
MENA Student Lead
NYU Abu Dhabi
Vishesh Mishra
India Student Lead
IIT Kanpur
Submission Guidelines

Submission Guidelines

Round 1 Submission

  1. Detailed description of the intended vulnerabilities and designs

    1. Should include explanations of what's being targeted and why

    2. Should include proposed vulnerabilities or methods of attack

  2. Current progress report

    1. Should include any relevant code/prompts for the AI

    2. Should include preliminary results if any have been gathered

Round 2 Submission

  1. Completed designs with vulnerabilities inserted

  2. Detailed report discussing the methodology you used

  3. Presentation (length TBD)

  4. Poster (details TBD)

Awards

Awards

First Place: $1000

Second Place: $750

Third Place: $500

Purple - Blue Gradient

2023 Winners

RegionIcons_USCANADA.png
Winners

Thank you 

Stacked NORDTECH Logo PNG-01_edited.jpg

Previous Competition

Our previous competition criteria's

bottom of page