Hardware Trojan Detection using Graph Neural Networks

04/25/2022
by   Rozhin Yasaei, et al.
0

The globalization of the Integrated Circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities around the world. The risk of using untrusted third-Party Intellectual Property (3PIP) is the possibility for adversaries to insert malicious modifications known as Hardware Trojans (HTs). These HTs can compromise the integrity, deteriorate the performance, and deny the functionality of the intended design. Various HT detection methods have been proposed in the literature; however, many fall short due to their reliance on a golden reference circuit, a limited detection scope, the need for manual code review, or the inability to scale with large modern designs. We propose a novel golden reference-free HT detection method for both Register Transfer Level (RTL) and gate-level netlists by leveraging Graph Neural Networks (GNNs) to learn the behavior of the circuit through a Data Flow Graph (DFG) representation of the hardware design. We evaluate our model on a custom dataset by expanding the Trusthub HT benchmarks <cit.>. The results demonstrate that our approach detects unknown HTs with 97 positive rate) very fast in 21.1ms for RTL and 84 Gate-Level Netlist.

READ FULL TEXT

page 2

page 5

page 6

page 8

page 14

research
07/14/2022

Golden Reference-Free Hardware Trojan Localization using Graph Convolutional Network

The globalization of the Integrated Circuit (IC) supply chain has moved ...
research
12/04/2021

Node-wise Hardware Trojan Detection Based on Graph Learning

In the Fourth Industrial Revolution (4IR) securing the protection of the...
research
03/27/2020

An Automated Framework for Board-level Trojan Benchmarking

Economic and operational advantages have led the supply chain of printed...
research
03/04/2022

Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores

The availability of wide-ranging third-party intellectual property (3PIP...
research
05/16/2022

ALICE: An Automatic Design Flow for eFPGA Redaction

Fabricating an integrated circuit is becoming unaffordable for many semi...
research
01/16/2022

Variability aware Golden Reference Free methodology for Hardware Trojan Detection Using Robust Delay Analysis

Many fabless semiconductor companies outsource their designs to third-pa...
research
11/07/2021

A Symbolic Approach to Detecting Hardware Trojans Triggered by Don't Care Transitions

Due to the globalization of Integrated Circuit (IC) supply chain, hardwa...

Please sign up or login with your details

Forgot password? Click here to reset