Technical Report for HW2VEC – A Graph Learning Tool for Automating Hardware Security

by   Yasamin Moghaddas, et al.

In this technical report, we present HW2VEC [11], an open-source graph learning tool for hardware security, and its implementation details (Figure 1). HW2VEC provides toolboxes for graph representation extraction in the form of Data Flow Graphs (DFGs) or Abstract Syntax Trees (ASTs) from hardware designs at RTL and GLN levels. Besides, HW2VEC also offers graph learning tools for representing hardware designs in vectors that preserve both structural features and behavioral features. To the best of our knowledge, HW2VEC is the first open-source research tool that supports applying graph learning methods to hardware designs in different abstraction levels for hardware security. We organize the remainder of this technical report as follows: Section 2 introduces the architecture of HW2VEC; Section 3 gives information about the use-case implementations; Section 4 provides the experimental results and demonstrates the performance of HW2VEC for two hardware security applications: HT detection and IP piracy detection; finally, Section 5 will conclude this report.



There are no comments yet.


page 3

page 22


HW2VEC: A Graph Learning Tool for Automating Hardware Security

The time-to-market pressure and continuous growing complexity of hardwar...

An architecture of open-source tools to combine textual information extraction, faceted search and information visualisation

This article presents our steps to integrate complex and partly unstruct...

Technical Report on a Virtual CTAP2 WebAuthn Authenticator

Even though passwordless authentication to online accounts offers greate...

MiniConf – A Virtual Conference Framework

MiniConf is a framework for hosting virtual academic conferences motivat...

On Declare MAX-SAT and a finite Herbrand Base for data-aware logs

This technical report provides some lightweight introduction motivating ...

A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment

Selected procedures in [1] and additional simulation results are present...

A New Doctrine for Hardware Security

In this paper, we promote the idea that recent woes in hardware security...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.