Hardware Trojan Detection Using Graph Neural Networks

被引:7
|
作者
Yasaei, Rozhin [1 ]
Chen, Luke [2 ]
Yu, Shih-Yuan [2 ]
Al Faruque, Mohammad Abdullah [1 ]
机构
[1] Univ Calif Irvine, Dept Elect Engn & Comp Sci, Irvine, CA 92697 USA
[2] Univ Calif Irvine, Irvine, CA 92697 USA
关键词
Hardware; Logic gates; Codes; Integrated circuit modeling; Integrated circuits; Feature extraction; Trojan horses; Gate-level netlist; golden reference free; graph neural network; hardware Trojan (HT) detection; register transfer level (RTL); security;
D O I
10.1109/TCAD.2022.3178355
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The globalization of the integrated circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities around the world. The risk of using untrusted third-party intellectual property (3PIP) is the possibility for adversaries to insert malicious modifications known as hardware trojans (HTs). These HTs can compromise the integrity, deteriorate the performance, and deny the functionality of the intended design. Various HT detection methods have been proposed in the literature; however, many fall short due to their reliance on a golden reference circuit, a limited detection scope, the need for manual code review, or the inability to scale with large modern designs. We propose a novel golden reference-free HT detection method for both register transfer level (RTL) and gate-level netlists by leveraging graph neural networks (GNNs) to learn the behavior of the circuit through a data flow graph (DFG) representation of the hardware design. We evaluate our model on a custom dataset by expanding the Trusthub HT benchmarks (Shakya et al., 2017). The results demonstrate that our approach detects unknown HTs with 97% recall (true positive rate) very fast in 21.1 ms for RTL and 84% recall in 13.42 s for gate-level netlist.
引用
收藏
页码:25 / 38
页数:14
相关论文
共 50 条
  • [41] Hardware Trojan Detection using Shapley Ensemble Boosting
    Pan, Zhixin
    Mishra, Prabhat
    2023 28TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC, 2023, : 496 - 503
  • [42] Hardware Trojan detection using path delay fingerprint
    Jin, Yier
    Makris, Yiorgos
    2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 51 - +
  • [43] Hardware Trojan Detection Using Reconfigurable Assertion Checkers
    Alsaiari, Uthman
    Gebali, Fayez
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (07) : 1575 - 1586
  • [44] Symbols Detection and Classification using Graph Neural Networks
    Renton, Guillaume
    Balcilar, Muhammet
    Heroux, Pierre
    Gauzere, Benoit
    Honeine, Paul
    Adam, Sebastien
    PATTERN RECOGNITION LETTERS, 2021, 152 : 391 - 397
  • [45] Hardware Trojan Detection Using Machine Learning: A Tutorial
    Gubbi, Kevin Immanuel
    Latibari, Banafsheh Saber
    Srikanth, Anirudh
    Sheaves, Tyler
    Beheshti-Shirazi, Sayed Arash
    Manoj, Sai P. D.
    Rafatirad, Satareh
    Sasan, Avesta
    Homayoun, Houman
    Salehi, Soheil
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2023, 22 (03)
  • [46] Disinformation detection using graph neural networks: a survey
    Lakzaei, Batool
    Chehreghani, Mostafa Haghir
    Bagheri, Alireza
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (03)
  • [47] Hardware Trojan Detection using Supervised Machine Learning
    Gowtham, M.
    Harsha, Kolluru Sri
    Nikhil, Jami
    Eswar, Maturi Sai
    Ramesh, S.R.
    Proceedings of the 6th International Conference on Communication and Electronics Systems, ICCES 2021, 2021, : 1451 - 1456
  • [48] Hardware Trojan Detection Using Backside Optical Imaging
    Zhou, Boyou
    Aksoylar, Aydan
    Vigil, Kyle
    Adato, Ronen
    Tan, Jian
    Goldberg, Bennett
    Unlu, M. Selim
    Joshi, Ajay
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (01) : 24 - 37
  • [49] Hardware Trojan Detection Using the Order of Path Delay
    Cui, Xiaotong
    Koopahi, Elnaz
    Wu, Kaijie
    Karri, Ramesh
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2018, 14 (03)
  • [50] Detection of Hardware Trojan in SEA Using Path Delay
    Kumar, Prasanna
    Srinivasan, Ramasamy
    2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,