HW2VEC: A Graph Learning Tool for Automating Hardware Security

07/26/2021
by   Shih Yuan Yu, et al.
0

The time-to-market pressure and continuous growing complexity of hardware designs have promoted the globalization of the Integrated Circuit (IC) supply chain. However, such globalization also poses various security threats in each phase of the IC supply chain. Although the advancements of Machine Learning (ML) have pushed the frontier of hardware security, most conventional ML-based methods can only achieve the desired performance by manually finding a robust feature representation for circuits that are non-Euclidean data. As a result, modeling these circuits using graph learning to improve design flows has attracted research attention in the Electronic Design Automation (EDA) field. However, due to the lack of supporting tools, only a few existing works apply graph learning to resolve hardware security issues. To attract more attention, we propose HW2VEC, an open-source graph learning tool that lowers the threshold for newcomers to research hardware security applications with graphs. HW2VEC provides an automated pipeline for extracting a graph representation from a hardware design in various abstraction levels (register transfer level or gate-level netlist). Besides, HW2VEC users can automatically transform the non-Euclidean hardware designs into Euclidean graph embeddings for solving their problems. In this paper, we demonstrate that HW2VEC can achieve state-of-the-art performance on two hardware security-related tasks: Hardware Trojan Detection and Intellectual Property Piracy Detection. We provide the time profiling results for the graph extraction and the learning pipelines in HW2VEC.

READ FULL TEXT

page 1

page 3

page 5

research
07/27/2021

Technical Report for HW2VEC – A Graph Learning Tool for Automating Hardware Security

In this technical report, we present HW2VEC [11], an open-source graph l...
research
04/19/2022

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation

Artificial intelligence (AI) and machine learning (ML) techniques have b...
research
12/04/2021

Node-wise Hardware Trojan Detection Based on Graph Learning

In the Fourth Industrial Revolution (4IR) securing the protection of the...
research
01/27/2020

Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA

Modern electronic systems become evermore complex, yet remain modular, w...
research
11/07/2021

A Symbolic Approach to Detecting Hardware Trojans Triggered by Don't Care Transitions

Due to the globalization of Integrated Circuit (IC) supply chain, hardwa...
research
07/20/2022

EVHA: Explainable Vision System for Hardware Testing and Assurance – An Overview

Due to the ever-growing demands for electronic chips in different sector...
research
04/15/2020

Speeding-up Logic Design and Refining Hardware EDA Flow by Exploring Chinese Character based Graphical Representation

Electrical design automation (EDA) techniques have deeply influenced the...

Please sign up or login with your details

Forgot password? Click here to reset