HW2VEC: A Graph Learning Tool for Automating Hardware Security
- URL: http://arxiv.org/abs/2107.12328v1
- Date: Mon, 26 Jul 2021 17:03:51 GMT
- Title: HW2VEC: A Graph Learning Tool for Automating Hardware Security
- Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad
Abdullah Al Faruque
- Abstract summary: We propose HW2VEC, an open-source graph learning tool for hardware security applications.
We show that HW2VEC can achieve state-of-the-art performance on two hardware security-related tasks: Hardware Trojan Detection and Intellectual Property Piracy Detection.
- Score: 4.188344897982036
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The time-to-market pressure and continuous growing complexity of hardware
designs have promoted the globalization of the Integrated Circuit (IC) supply
chain. However, such globalization also poses various security threats in each
phase of the IC supply chain. Although the advancements of Machine Learning
(ML) have pushed the frontier of hardware security, most conventional ML-based
methods can only achieve the desired performance by manually finding a robust
feature representation for circuits that are non-Euclidean data. As a result,
modeling these circuits using graph learning to improve design flows has
attracted research attention in the Electronic Design Automation (EDA) field.
However, due to the lack of supporting tools, only a few existing works apply
graph learning to resolve hardware security issues. To attract more attention,
we propose HW2VEC, an open-source graph learning tool that lowers the threshold
for newcomers to research hardware security applications with graphs. HW2VEC
provides an automated pipeline for extracting a graph representation from a
hardware design in various abstraction levels (register transfer level or
gate-level netlist). Besides, HW2VEC users can automatically transform the
non-Euclidean hardware designs into Euclidean graph embeddings for solving
their problems. In this paper, we demonstrate that HW2VEC can achieve
state-of-the-art performance on two hardware security-related tasks: Hardware
Trojan Detection and Intellectual Property Piracy Detection. We provide the
time profiling results for the graph extraction and the learning pipelines in
HW2VEC.
Related papers
- Automatic Graph Topology-Aware Transformer [50.2807041149784]
We build a comprehensive graph Transformer search space with the micro-level and macro-level designs.
EGTAS evolves graph Transformer topologies at the macro level and graph-aware strategies at the micro level.
We demonstrate the efficacy of EGTAS across a range of graph-level and node-level tasks.
arXiv Detail & Related papers (2024-05-30T07:44:31Z) - Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach [0.0]
Intrusion detection systems (IDS) are crucial security measures nowadays to enforce network security.
In this paper, we analyze the concept of intelligent IDS (I-IDS) while addressing the specific requirements of Edge devices.
We introduce a systematic approach to constructing the I-IDS on reconfigurable Edge hardware.
arXiv Detail & Related papers (2024-04-13T17:24:18Z) - OTOv3: Automatic Architecture-Agnostic Neural Network Training and
Compression from Structured Pruning to Erasing Operators [57.145175475579315]
This topic spans various techniques, from structured pruning to neural architecture search, encompassing both pruning and erasing operators perspectives.
We introduce the third-generation Only-Train-Once (OTOv3), which first automatically trains and compresses a general DNN through pruning and erasing operations.
Our empirical results demonstrate the efficacy of OTOv3 across various benchmarks in structured pruning and neural architecture search.
arXiv Detail & Related papers (2023-12-15T00:22:55Z) - Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V [0.0]
Unauthorized access, fault injection, and privacy invasion are potential threats from untrusted actors.
We propose an integrated Information Flow Tracking (IFT) technique to enable runtime security to protect system integrity.
This study proposes a multi-level IFT model that integrates a hardware-based IFT technique with a gate-level-based IFT (GLIFT) technique.
arXiv Detail & Related papers (2023-11-17T02:04:07Z) - Verilog-to-PyG -- A Framework for Graph Learning and Augmentation on RTL
Designs [15.67829950106923]
We introduce an innovative open-source framework that translates RTL designs into graph representation foundations.
The Verilog-to-PyG (V2PYG) framework is compatible with the open-source Electronic Design Automation (EDA) toolchain OpenROAD.
We will present novel RTL data augmentation methods that enable functional equivalent design augmentation for the construction of an extensive graph-based RTL design database.
arXiv Detail & Related papers (2023-11-09T20:11:40Z) - CktGNN: Circuit Graph Neural Network for Electronic Design Automation [67.29634073660239]
This paper presents a Circuit Graph Neural Network (CktGNN) that simultaneously automates the circuit topology generation and device sizing.
We introduce Open Circuit Benchmark (OCB), an open-sourced dataset that contains $10$K distinct operational amplifiers.
Our work paves the way toward a learning-based open-sourced design automation for analog circuits.
arXiv Detail & Related papers (2023-08-31T02:20:25Z) - SimTeG: A Frustratingly Simple Approach Improves Textual Graph Learning [131.04781590452308]
We present SimTeG, a frustratingly Simple approach for Textual Graph learning.
We first perform supervised parameter-efficient fine-tuning (PEFT) on a pre-trained LM on the downstream task.
We then generate node embeddings using the last hidden states of finetuned LM.
arXiv Detail & Related papers (2023-08-03T07:00:04Z) - DSHGT: Dual-Supervisors Heterogeneous Graph Transformer -- A pioneer study of using heterogeneous graph learning for detecting software vulnerabilities [12.460745260973837]
Vulnerability detection is a critical problem in software security and attracts growing attention both from academia and industry.
Recent advances in deep learning, especially Graph Neural Networks (GNN), have uncovered the feasibility of automatic detection of a wide range of software vulnerabilities.
In this work, we are one of the first to explore heterogeneous graph representation in the form of Code Property Graph.
arXiv Detail & Related papers (2023-06-02T08:57:13Z) - GraphMAE: Self-Supervised Masked Graph Autoencoders [52.06140191214428]
We present a masked graph autoencoder GraphMAE that mitigates issues for generative self-supervised graph learning.
We conduct extensive experiments on 21 public datasets for three different graph learning tasks.
The results manifest that GraphMAE--a simple graph autoencoder with our careful designs--can consistently generate outperformance over both contrastive and generative state-of-the-art baselines.
arXiv Detail & Related papers (2022-05-22T11:57:08Z) - Contrastive Graph Convolutional Networks for Hardware Trojan Detection
in Third Party IP Cores [12.98813441041061]
Malicious logic (Hardware Trojans, HT) being surreptitiously injected by untrusted vendors into 3PIP cores used in IC design is an ever present threat.
We develop methods for identification of trigger-based HT in designs containing synthesizable IP cores without a golden model.
We propose GATE-Net, a deep learning model based on graph-convolutional networks (GCN) trained using supervised contrastive learning.
arXiv Detail & Related papers (2022-03-04T02:19:52Z) - Software Vulnerability Detection via Deep Learning over Disaggregated
Code Graph Representation [57.92972327649165]
This work explores a deep learning approach to automatically learn the insecure patterns from code corpora.
Because code naturally admits graph structures with parsing, we develop a novel graph neural network (GNN) to exploit both the semantic context and structural regularity of a program.
arXiv Detail & Related papers (2021-09-07T21:24:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.