Hardware Trojan Detection Using Graph Neural Networks

被引:7
|
作者
Yasaei, Rozhin [1 ]
Chen, Luke [2 ]
Yu, Shih-Yuan [2 ]
Al Faruque, Mohammad Abdullah [1 ]
机构
[1] Univ Calif Irvine, Dept Elect Engn & Comp Sci, Irvine, CA 92697 USA
[2] Univ Calif Irvine, Irvine, CA 92697 USA
关键词
Hardware; Logic gates; Codes; Integrated circuit modeling; Integrated circuits; Feature extraction; Trojan horses; Gate-level netlist; golden reference free; graph neural network; hardware Trojan (HT) detection; register transfer level (RTL); security;
D O I
10.1109/TCAD.2022.3178355
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The globalization of the integrated circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities around the world. The risk of using untrusted third-party intellectual property (3PIP) is the possibility for adversaries to insert malicious modifications known as hardware trojans (HTs). These HTs can compromise the integrity, deteriorate the performance, and deny the functionality of the intended design. Various HT detection methods have been proposed in the literature; however, many fall short due to their reliance on a golden reference circuit, a limited detection scope, the need for manual code review, or the inability to scale with large modern designs. We propose a novel golden reference-free HT detection method for both register transfer level (RTL) and gate-level netlists by leveraging graph neural networks (GNNs) to learn the behavior of the circuit through a data flow graph (DFG) representation of the hardware design. We evaluate our model on a custom dataset by expanding the Trusthub HT benchmarks (Shakya et al., 2017). The results demonstrate that our approach detects unknown HTs with 97% recall (true positive rate) very fast in 21.1 ms for RTL and 84% recall in 13.42 s for gate-level netlist.
引用
收藏
页码:25 / 38
页数:14
相关论文
共 50 条
  • [21] Hardware Trojan Detection Based on ELM Neural Network
    Wang, Sixiang
    Dong, Xiuze
    Sun, Kewang
    Cui, Qi
    Li, Dongxu
    He, Chunxiao
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 400 - 403
  • [22] Computer Vision for Hardware Trojan Detection on a PCB Using Siamese Neural Network
    Piliposyan, Gor
    Khursheed, Saqib
    2022 IEEE PHYSICAL ASSURANCE AND INSPECTION OF ELECTRONICS (PAINE), 2022, : 15 - 21
  • [23] Hardware Acceleration of Graph Neural Networks
    Auten, Adam
    Tomei, Matthew
    Kumar, Rakesh
    PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [24] BGNN-HT: Bidirectional Graph Neural Network for Hardware Trojan Cells Detection at Gate Level
    Zhan, Peiheng
    Shen, Haihua
    Li, Shan
    Li, Huawei
    2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [25] On the feasibility of using evolvable hardware for hardware Trojan detection and prevention
    Labafniya, Mansoureh
    Picek, Stjepan
    Borujeni, Shahram Etemadi
    Mentens, Nele
    APPLIED SOFT COMPUTING, 2020, 91
  • [26] Hardware Trojan Detection using FBHT in FPGAs
    Qayyum, Sundus
    Qureshi, Kashif Naseer
    Bashir, Faisal
    Ul Islam, Najam
    Malik, Nazir
    PROCEEDINGS OF 2020 17TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2020, : 422 - 427
  • [27] Hardware Trojan Detection using Xilinx Vivado
    Marlow, Ryan
    Harper, Scott
    Batchelor, Whitney
    Graf, Jonathan
    NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 86 - 91
  • [28] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
  • [29] Towards Hardware Trojan Resilient Design of Convolutional Neural Networks
    Sun, Peiyao
    Halak, Basel
    Kazmierski, Tomasz
    2022 IEEE 35TH INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (IEEE SOCC 2022), 2022, : 130 - 135
  • [30] Hardware trojan detection
    Case Western Reserve University, Cleveland, United States
    Introduction to Hardw. Secty. and Trust, (339-364):