A Data-Free Membership Inference Attack on Federated Learning in Hardware Assurance
Gijung Lee , Wavid Bowman , Olivia P. Dizon-Paradis , Reiner N. Dizon-Paradis , Ronald Wilson , Damon L. Woodard , Domenic Forte
Published on arXiv
2604.19891
Model Inversion Attack
OWASP ML Top 10 — ML03
Membership Inference Attack
OWASP ML Top 10 — ML04
Key Finding
Successfully distinguishes between circuit layers (metal vs. diffusion) and technology nodes (32nm vs. 90nm) using data-free gradient inversion in federated learning for hardware IP
SCLL-guided Gradient Inversion Attack
Novel technique introduced
Federated Learning (FL) is an emerging solution to the data scarcity problem for training deep learning models in hardware assurance. While FL is designed to enhance privacy by not sharing raw data, it remains vulnerable to Membership Inference Attacks (MIAs) that can leak sensitive intellectual property (IP). Traditional MIAs are often impractical in this domain because they require access to auxiliary datasets that can match the unique statistical properties of private data. This paper introduces a novel, data-free MIA targeting image segmentation models in FL for hardware assurance. Our methodology leverages Standard Cell Library Layouts (SCLLs) as priors to guide a gradient inversion attack, allowing an adversary to reconstruct images from a client's intercepted model update without needing any private data. We demonstrate that, by analyzing the reconstruction fidelity, an adversary can infer sensitive hardware characteristics, successfully distinguishing between circuit layers (e.g., metal vs. diffusion) and technology nodes (e.g., 32nm vs. 90nm). Our findings reveal that a novel loss term can conditionally amplify the attack's effectiveness by overcoming evaluation bottlenecks for structurally complex data. This work underscores a significant IP risk, challenging the assumption that FL provides inherent privacy guarantees and proving that severe information leakage can occur even without access to domain-specific datasets.
Key Contributions
- Novel data-free gradient inversion attack using Standard Cell Library Layouts as priors to reconstruct hardware circuit images without auxiliary datasets
- Demonstrates successful inference of sensitive hardware IP characteristics (circuit layers and technology nodes) from reconstruction fidelity analysis
- Introduces novel loss term that conditionally amplifies attack effectiveness for structurally complex hardware data
🛡️ Threat Analysis
Primary contribution is reconstructing private training data (hardware circuit layouts) from intercepted model gradients in federated learning — this is a gradient leakage/reconstruction attack where the adversary recovers images from model updates.
Secondary contribution uses reconstruction fidelity to perform membership inference, determining whether specific hardware characteristics (circuit layers, technology nodes) were present in the training data.