Graph Neural Networks for Hardware Vulnerability Analysis - Can you Trust your GNN?

被引:2
|
作者
Alrahis, Lilas [1 ]
Sinanoglu, Ozgur [1 ]
机构
[1] New York Univ Abu Dhabi, Ctr Cybersecur, Abu Dhabi, U Arab Emirates
关键词
Graph neural networks; Hardware security; Hardware Trojans; Intellectual property; Backdoor attacks;
D O I
10.1109/VTS56346.2023.10140095
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The participation of third-party entities in the globalized semiconductor supply chain introduces potential security vulnerabilities, such as intellectual property piracy and hardware Trojan (HT) insertion. Graph neural networks (GNNs) have been employed to address various hardware security threats, owing to their superior performance on graph-structured data, such as circuits. However, GNNs are also susceptible to attacks. This work examines the use of GNNs for detecting hardware threats like HTs and their vulnerability to attacks. We present BadGNN, a backdoor attack on GNNs that can hide HTs and evade detection with a 100% success rate through minor circuit perturbations. Our findings highlight the need for further investigation into the security and robustness of GNNs before they can be safely used in security-critical applications.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Hardware Acceleration of Graph Neural Networks
    Auten, Adam
    Tomei, Matthew
    Kumar, Rakesh
    PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [22] HGK-GNN: Heterogeneous Graph Kernel based Graph Neural Networks
    Long, Qingqing
    Xu, Lingjun
    Fang, Zheng
    Song, Guojie
    KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 1129 - 1138
  • [23] Policy-GNN: Aggregation Optimization for Graph Neural Networks
    Lai, Kwei-Herng
    Zha, Daochen
    Zhou, Kaixiong
    Hu, Xia
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 461 - 471
  • [24] GNN-Retro: Retrosynthetic Planning with Graph Neural Networks
    Han, Peng
    Zhao, Peilin
    Lu, Chan
    Huang, Junzhou
    Wu, Jiaxiang
    Shang, Shuo
    Yao, Bin
    Zhang, Xiangliang
    THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 4014 - 4021
  • [25] If you can't trust your mother, who can you trust? Soul murder, psychoanalysis and creativity
    Fleming, Svetlana
    PSYCHODYNAMIC PRACTICE, 2015, 21 (04) : 394 - +
  • [26] Can you trust your animal study data?
    Peers, Ian S.
    South, Marie C.
    Ceuppens, Peter R.
    Bright, Jonathan D.
    Pilling, Elizabeth
    NATURE REVIEWS DRUG DISCOVERY, 2014, 13 (07) : 560 - 560
  • [27] Can you trust your cancer cell lines?
    Asher Mullard
    Nature Reviews Drug Discovery, 2018, 17 : 613 - 613
  • [28] Can you trust your law firm? Conversation
    Fryer, B
    Koniak, S
    HARVARD BUSINESS REVIEW, 2002, 80 (11) : 22 - +
  • [29] Can you trust your animal study data?
    Ian S. Peers
    Marie C. South
    Peter R. Ceuppens
    Jonathan D. Bright
    Elizabeth Pilling
    Nature Reviews Drug Discovery, 2014, 13 : 560 - 560
  • [30] Can you trust your aqueous system simulations?
    Linkson, PB
    CHEMICAL ENGINEERING PROGRESS, 1998, 94 (05) : 63 - 68