Contrastive Graph Convolutional Networks for Hardware Trojan Detection
in Third Party IP Cores
- URL: http://arxiv.org/abs/2203.02095v1
- Date: Fri, 4 Mar 2022 02:19:52 GMT
- Title: Contrastive Graph Convolutional Networks for Hardware Trojan Detection
in Third Party IP Cores
- Authors: Nikhil Muralidhar, Abdullah Zubair, Nathanael Weidler, Ryan Gerdes and
Naren Ramakrishnan
- Abstract summary: Malicious logic (Hardware Trojans, HT) being surreptitiously injected by untrusted vendors into 3PIP cores used in IC design is an ever present threat.
We develop methods for identification of trigger-based HT in designs containing synthesizable IP cores without a golden model.
We propose GATE-Net, a deep learning model based on graph-convolutional networks (GCN) trained using supervised contrastive learning.
- Score: 12.98813441041061
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The availability of wide-ranging third-party intellectual property (3PIP)
cores enables integrated circuit (IC) designers to focus on designing
high-level features in ASICs/SoCs. The massive proliferation of ICs brings with
it an increased number of bad actors seeking to exploit those circuits for
various nefarious reasons. This is not surprising as integrated circuits affect
every aspect of society. Thus, malicious logic (Hardware Trojans, HT) being
surreptitiously injected by untrusted vendors into 3PIP cores used in IC design
is an ever present threat. In this paper, we explore methods for identification
of trigger-based HT in designs containing synthesizable IP cores without a
golden model. Specifically, we develop methods to detect hardware trojans by
detecting triggers embedded in ICs purely based on netlists acquired from the
vendor. We propose GATE-Net, a deep learning model based on graph-convolutional
networks (GCN) trained using supervised contrastive learning, for flagging
designs containing randomly-inserted triggers using only the corresponding
netlist. Our proposed architecture achieves significant improvements over
state-of-the-art learning models yielding an average 46.99% improvement in
detection performance for combinatorial triggers and 21.91% improvement for
sequential triggers across a variety of circuit types. Through rigorous
experimentation, qualitative and quantitative performance evaluations, we
demonstrate effectiveness of GATE-Net and the supervised contrastive training
of GATE-Net for HT detection.
Related papers
- Benchmarking End-To-End Performance of AI-Based Chip Placement Algorithms [77.71341200638416]
ChiPBench is a benchmark designed to evaluate the effectiveness of AI-based chip placement algorithms.
We have gathered 20 circuits from various domains (e.g., CPU, GPU, and microcontrollers) for evaluation.
Results show that even if intermediate metric of a single-point algorithm is dominant, the final PPA results are unsatisfactory.
arXiv Detail & Related papers (2024-07-03T03:29:23Z) - Evasive Hardware Trojan through Adversarial Power Trace [6.949268510101616]
We introduce a HT obfuscation (HTO) approach to allow HTs to bypass detection method.
HTO can be implemented with only a single transistor for ASICs and FPGAs.
We show that an adaptive attacker can still design evasive HTOs by constraining the design with a spectral noise budget.
arXiv Detail & Related papers (2024-01-04T16:28:15Z) - Cal-DETR: Calibrated Detection Transformer [67.75361289429013]
We propose a mechanism for calibrated detection transformers (Cal-DETR), particularly for Deformable-DETR, UP-DETR and DINO.
We develop an uncertainty-guided logit modulation mechanism that leverages the uncertainty to modulate the class logits.
Results corroborate the effectiveness of Cal-DETR against the competing train-time methods in calibrating both in-domain and out-domain detections.
arXiv Detail & Related papers (2023-11-06T22:13:10Z) - CktGNN: Circuit Graph Neural Network for Electronic Design Automation [67.29634073660239]
This paper presents a Circuit Graph Neural Network (CktGNN) that simultaneously automates the circuit topology generation and device sizing.
We introduce Open Circuit Benchmark (OCB), an open-sourced dataset that contains $10$K distinct operational amplifiers.
Our work paves the way toward a learning-based open-sourced design automation for analog circuits.
arXiv Detail & Related papers (2023-08-31T02:20:25Z) - Golden Reference-Free Hardware Trojan Localization using Graph
Convolutional Network [13.789604831994364]
Hardware Trojans (HTs) can compromise the integrity, deteriorate the performance, deny the service, and alter the functionality of the design.
We propose a novel, golden reference-free HT localization method at the pre-silicon stage by leveraging Graph Convolutional Network (GCN)
It locates the Trojan signals with 99.6% accuracy, 93.1% F1-score, and a false-positive rate below 0.009%.
arXiv Detail & Related papers (2022-07-14T05:27:16Z) - Third-Party Hardware IP Assurance against Trojans through Supervised
Learning and Post-processing [3.389624476049805]
VIPR is a systematic machine learning (ML) based trust verification solution for 3PIPs.
We present a comprehensive framework, associated algorithms, and a tool flow for obtaining an optimal set of features.
The proposed post-processing algorithms reduce false positives by up to 92.85%.
arXiv Detail & Related papers (2021-11-29T21:04:53Z) - Semi-Supervised Few-Shot Intent Classification and Slot Filling [3.602651625446309]
Intent classification (IC) and slot filling (SF) are two fundamental tasks in modern Natural Language Understanding (NLU) systems.
In this work, we investigate how contrastive learning and unsupervised data augmentation methods can benefit these existing supervised meta-learning pipelines.
arXiv Detail & Related papers (2021-09-17T20:26:23Z) - Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge
Computing: A Contextual-Bandit Approach [81.5261621619557]
We propose an adaptive anomaly detection scheme with hierarchical edge computing (HEC)
We first construct multiple anomaly detection DNN models with increasing complexity, and associate each of them to a corresponding HEC layer.
Then, we design an adaptive model selection scheme that is formulated as a contextual-bandit problem and solved by using a reinforcement learning policy network.
arXiv Detail & Related papers (2021-08-09T08:45:47Z) - HW2VEC: A Graph Learning Tool for Automating Hardware Security [4.188344897982036]
We propose HW2VEC, an open-source graph learning tool for hardware security applications.
We show that HW2VEC can achieve state-of-the-art performance on two hardware security-related tasks: Hardware Trojan Detection and Intellectual Property Piracy Detection.
arXiv Detail & Related papers (2021-07-26T17:03:51Z) - SADet: Learning An Efficient and Accurate Pedestrian Detector [68.66857832440897]
This paper proposes a series of systematic optimization strategies for the detection pipeline of one-stage detector.
It forms a single shot anchor-based detector (SADet) for efficient and accurate pedestrian detection.
Though structurally simple, it presents state-of-the-art result and real-time speed of $20$ FPS for VGA-resolution images.
arXiv Detail & Related papers (2020-07-26T12:32:38Z) - Learning to Hash with Graph Neural Networks for Recommender Systems [103.82479899868191]
Graph representation learning has attracted much attention in supporting high quality candidate search at scale.
Despite its effectiveness in learning embedding vectors for objects in the user-item interaction network, the computational costs to infer users' preferences in continuous embedding space are tremendous.
We propose a simple yet effective discrete representation learning framework to jointly learn continuous and discrete codes.
arXiv Detail & Related papers (2020-03-04T06:59:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.