Node-wise Hardware Trojan Detection Based on Graph Learning

12/04/2021
by   Kento Hasegawa, et al.
0

In the Fourth Industrial Revolution (4IR) securing the protection of the supply chain has become an ever-growing concern. One such cyber threat is a Hardware Trojan (HT), a malicious modification to an integrated circuit (IC). HTs are often identified in the hardware manufacturing process, but should be removed earlier, when the design is being specified. Machine learning-based HT detection in gate-level netlists is an efficient approach to identify HTs at the early stage. However, feature-based modeling has limitations in discovering an appropriate set of HT features. We thus propose NHTD-GL in this paper, a novel node-wise HT detection method based on graph learning (GL). Given the formal analysis of HT features obtained from domain knowledge, NHTD-GL bridges the gap between graph representation learning and feature-based HT detection. The experimental results demonstrate that NHTD-GL achieves 0.998 detection accuracy and outperforms state-of-the-art node-wise HT detection methods. NHTD-GL extracts HT features without heuristic feature engineering.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/25/2022

Hardware Trojan Detection using Graph Neural Networks

The globalization of the Integrated Circuit (IC) supply chain has moved ...
research
07/26/2021

HW2VEC: A Graph Learning Tool for Automating Hardware Security

The time-to-market pressure and continuous growing complexity of hardwar...
research
03/12/2019

Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network

With the globalization of the semiconductor manufacturing process, elect...
research
07/14/2022

Golden Reference-Free Hardware Trojan Localization using Graph Convolutional Network

The globalization of the Integrated Circuit (IC) supply chain has moved ...
research
04/27/2022

LiftPool: Lifting-based Graph Pooling for Hierarchical Graph Representation Learning

Graph pooling has been increasingly considered for graph neural networks...
research
11/07/2021

A Symbolic Approach to Detecting Hardware Trojans Triggered by Don't Care Transitions

Due to the globalization of Integrated Circuit (IC) supply chain, hardwa...
research
12/16/2020

Learning to Recognize Patch-Wise Consistency for Deepfake Detection

We propose to detect Deepfake generated by face manipulation based on on...

Please sign up or login with your details

Forgot password? Click here to reset