Hardware Trojan Detection using Graph Neural Networks
نویسندگان
چکیده
The globalization of the Integrated Circuit (IC) supply chain has moved most design, fabrication, and testing process from a single trusted entity to various untrusted third party entities around world. risk using third-Party Intellectual Property (3PIP) is possibility for adversaries insert malicious modifications known as Hardware Trojans (HTs). These HTs can compromise integrity, deteriorate performance, deny functionality intended design. Various HT detection methods have been proposed in literature; however, many fall short due their reliance on golden reference circuit, limited scope, need manual code review, or inability scale with large modern designs. We propose novel reference-free method both Register Transfer Level (RTL) gate-level netlists by leveraging Graph Neural Networks (GNNs) learn behavior circuit through Data Flow (DFG) representation hardware evaluate our model custom dataset expanding Trusthub benchmarks trusthub1. results demonstrate that approach detects unknown 97% recall (true positive rate) very fast 21.1ms RTL 84% 13.42s Gate-Level Netlist.
منابع مشابه
Hardware Trojan Identification and Detection
The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...
متن کاملrodbar dam slope stability analysis using neural networks
در این تحقیق شبکه عصبی مصنوعی برای پیش بینی مقادیر ضریب اطمینان و فاکتور ایمنی بحرانی سدهای خاکی ناهمگن ضمن در نظر گرفتن تاثیر نیروی اینرسی زلزله ارائه شده است. ورودی های مدل شامل ارتفاع سد و زاویه شیب بالا دست، ضریب زلزله، ارتفاع آب، پارامترهای مقاومتی هسته و پوسته و خروجی های آن شامل ضریب اطمینان می شود. مهمترین پارامتر مورد نظر در تحلیل پایداری شیب، بدست آوردن فاکتور ایمنی است. در این تحقیق ...
A Hardware Trojan Detection Framework
In the recent years, hardware trojans have become a serious issue in the field of integrated circuits. Our work presents a framework for hardware trojan detection in wireless cryptographic integrated circuits. It deals with the leaking of secret information through a wireless communication, using a mixed-signal integrated circuit technique. A trojan is inserted in the introduced system, which d...
متن کاملSystem-level protection and hardware Trojan detection using weighted voting☆
The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during the design process. Recent research is performed to detect Trojans embedded at manufacturing time by comparing the suspected chip with a golden c...
متن کاملHardware Trojan Detection Using Multi-Parameter Functional Side-Channel Analysis
A hardware trojan is a modification to a hardware design which inserts undesired or malicious functionality to the design. They pose a substantial security risk, and rapid, reliable detection of these trojans has become a critical necessity. In this paper, we propose a method for detecting compromised designs quickly and effectively. The process involves a multi-parameter analysis of the design...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
سال: 2022
ISSN: ['1937-4151', '0278-0070']
DOI: https://doi.org/10.1109/tcad.2022.3178355