Golden Reference-Free Hardware Trojan Localization using Graph Convolutional Network

07/14/2022
by   Rozhin Yasaei, et al.
0

The globalization of the Integrated Circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities worldwide. The risk of using untrusted third-Party Intellectual Property (3PIP) is the possibility for adversaries to insert malicious modifications known as Hardware Trojans (HTs). These HTs can compromise the integrity, deteriorate the performance, deny the service, and alter the functionality of the design. While numerous HT detection methods have been proposed in the literature, the crucial task of HT localization is overlooked. Moreover, a few existing HT localization methods have several weaknesses: reliance on a golden reference, inability to generalize for all types of HT, lack of scalability, low localization resolution, and manual feature engineering/property definition. To overcome their shortcomings, we propose a novel, golden reference-free HT localization method at the pre-silicon stage by leveraging Graph Convolutional Network (GCN). In this work, we convert the circuit design to its intrinsic data structure, graph and extract the node attributes. Afterward, the graph convolution performs automatic feature extraction for nodes to classify the nodes as Trojan or benign. Our automated approach does not burden the designer with manual code review. It locates the Trojan signals with 99.6 a false-positive rate below 0.009

READ FULL TEXT

page 1

page 2

page 4

page 7

page 8

page 9

research
04/25/2022

Hardware Trojan Detection using Graph Neural Networks

The globalization of the Integrated Circuit (IC) supply chain has moved ...
research
02/16/2022

Turn Tree into Graph: Automatic Code Review via Simplified AST Driven Graph Convolutional Network

Automatic code review (ACR), which can relieve the costs of manual inspe...
research
08/02/2020

Relation Extraction with Self-determined Graph Convolutional Network

Relation Extraction is a way of obtaining the semantic relationship betw...
research
12/04/2021

Node-wise Hardware Trojan Detection Based on Graph Learning

In the Fourth Industrial Revolution (4IR) securing the protection of the...
research
03/06/2019

Generative Graph Convolutional Network for Growing Graphs

Modeling generative process of growing graphs has wide applications in s...
research
03/04/2022

Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores

The availability of wide-ranging third-party intellectual property (3PIP...
research
01/16/2022

Variability aware Golden Reference Free methodology for Hardware Trojan Detection Using Robust Delay Analysis

Many fabless semiconductor companies outsource their designs to third-pa...

Please sign up or login with your details

Forgot password? Click here to reset