A Unioned Graph Neural Network Based Hardware Trojan Node Detection
نویسندگان
چکیده
The globalization of the integrated circuit (IC) industry has raised concerns about hardware Trojans (HT), and there is an urgent need for efficient HT-detection methods gate-level netlists. In this work, we propose approach to detect Trojan-nodes at gate level, based on graph learning. proposed method does not require any golden model can be easily into circuits design flow. addition, further a unioned GNN network combine information from input side, output neighbor side directed generate representative node embeddings. experimental results show that it could achieve 93.4% in recall, 91.4% F-measure, 90.7% precision average across different designs, which outperforms state-of-the-art HT detection methods.
منابع مشابه
A Hardware Trojan Detection Framework
In the recent years, hardware trojans have become a serious issue in the field of integrated circuits. Our work presents a framework for hardware trojan detection in wireless cryptographic integrated circuits. It deals with the leaking of secret information through a wireless communication, using a mixed-signal integrated circuit technique. A trojan is inserted in the introduced system, which d...
متن کاملHardware Trojan Identification and Detection
The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...
متن کاملRadial Basis Neural Network Based Islanding Detection in Distributed Generation
This article presents a Radial Basis Neural Network (RBNN) based islanding detection technique. Islanding detection and prevention is a mandatory requirement for grid-connected distributed generation (DG) systems. Several methods based on passive and active detection scheme have been proposed. While passive schemes have a large non detection zone (NDZ), concern has been raised on active method ...
متن کاملHaTCh: A Formal Framework of Hardware Trojan Design and Detection
Electronic Design Automation (EDA) industry heavily reuses existing design blocks called IP cores. These IP cores are vulnerable to insertion of Hardware Trojans (HTs) at design time by third party IP core providers or by malicious insiders in the design team. State of the art research has shown that existing trojan detection techniques which claim to detect all publicly available HT benchmarks...
متن کاملMERO: A Statistical Approach for Hardware Trojan Detection
In order to ensure trusted in–field operation of integrated circuits, it is important to develop efficient low–cost techniques to detect malicious tampering (also referred to as Hardware Trojan) that causes undesired change in functional behavior. Conventional post–manufacturing testing, test generation algorithms and test coverage metrics cannot be readily extended to hardware Trojan detection...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Electronics Express
سال: 2023
ISSN: ['1349-2543', '1349-9467']
DOI: https://doi.org/10.1587/elex.20.20230204