论文标题
使用图形神经网络的硬件特洛伊木马检测
Hardware Trojan Detection using Graph Neural Networks
论文作者
论文摘要
综合电路(IC)供应链的全球化已将大部分设计,制造和测试过程从单一的受信任实体转移到世界各地的各种不受信任的第三方实体。使用不信任的第三方知识产权(3PIP)的风险是,对手可能会插入称为硬件木马(HTS)的恶意修改。这些HT可以损害性能的完整性,恶化,并否认预期设计的功能。文献中已经提出了各种HT检测方法。但是,由于依赖黄金参考电路,有限的检测范围,对手动代码审查的需求或无法通过大型现代设计进行扩展,因此许多人缺乏。我们通过利用图形神经网络(GNN)来通过数据流程图(DFG)表示硬件设计来了解电路的行为,从而提出了一种针对寄存器传输级别(RTL)和栅极级网表的新颖的金色HT检测方法。我们通过扩展trusthub ht基准\ cite {trusThub1}来评估自定义数据集上的模型。结果表明,我们的方法在21.1m的RTL中检测到97%的召回率(真正的正率)的未知HT,对于GATE级Netlist,在13.42s中检测到84%的召回率。
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities around the world. The risk of using untrusted third-Party Intellectual Property (3PIP) is the possibility for adversaries to insert malicious modifications known as Hardware Trojans (HTs). These HTs can compromise the integrity, deteriorate the performance, and deny the functionality of the intended design. Various HT detection methods have been proposed in the literature; however, many fall short due to their reliance on a golden reference circuit, a limited detection scope, the need for manual code review, or the inability to scale with large modern designs. We propose a novel golden reference-free HT detection method for both Register Transfer Level (RTL) and gate-level netlists by leveraging Graph Neural Networks (GNNs) to learn the behavior of the circuit through a Data Flow Graph (DFG) representation of the hardware design. We evaluate our model on a custom dataset by expanding the Trusthub HT benchmarks \cite{trusthub1}. The results demonstrate that our approach detects unknown HTs with 97% recall (true positive rate) very fast in 21.1ms for RTL and 84% recall in 13.42s for Gate-Level Netlist.