TROJAN-GUARD: Hardware Trojans Detection Using GNN in RTL Designs
By Kiran Thorat ∗, Amit Hasan ∗, Caiwen Ding †, Zhijie Shi ∗
∗ Computer Science and Engineering Department, University of Connecticut
† Department of Computer Science & Engineering, University of Minnesota
Abstract
Chip manufacturing is a complex process, and to achieve a faster time to market, an increasing number of untrusted third-party tools and designs from around the world are being utilized. The use of these untrusted third party intellectual properties (IPs) and tools increases the risk of adversaries inserting hardware trojans (HTs). The covert nature of HTs poses significant threats to cyberspace, potentially leading to severe consequences for national security, the economy, and personal privacy. Many graph neural network (GNN)-based HT detection methods have been proposed. However, they perform poorly on larger designs because they rely on training with smaller designs. Additionally, these methods do not explore different GNN models that are well-suited for HT detection or provide efficient training and inference processes. We propose a novel framework that generates graph embeddings for large designs (e.g., RISC-V) and incorporates various GNN models tailored for HT detection. Furthermore, our framework introduces domain-specific techniques for efficient training and inference by implementing model quantization. Model quantization reduces the precision of the weights, lowering the computational requirements, enhancing processing speed without significantly affecting detection accuracy. We evaluate our framework using a custom dataset, and our results demonstrate a precision of 98.66% and a recall (true positive rate) of 92.30%, highlighting the effectiveness and efficiency of our approach in detecting hardware trojans in large-scale chip designs
To read the full article, click here
Related Semiconductor IP
- Flash Memory LDPC Decoder IP Core
- SLM Signal Integrity Monitor
- USB 4.0 V2 PHY - 4TX/2RX, TSMC N3P , North/South Poly Orientation
- TSMC CLN5FF GUCIe LP Die-to-Die PHY
- Ultra Ethernet Verification IP
Related White Papers
- A Survey on the Design, Detection, and Prevention of Pre-Silicon Hardware Trojans
- Abstraction and Control-Dominated Hardware Designs
- Automated On-the-Fly Verification of Designs Using Detector-Based Methodology
- Clock Domain Crossing Glitch Detection Using Formal Verification
Latest White Papers
- Exploring the Latest Innovations in MIPI D-PHY and MIPI C-PHY
- How to design secure SoCs, Part V: Data Protection and Encryption
- Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection
- Understanding LTTPR: Enabling High-Speed DisplayPort Interconnects in Complex System Designs
- NVIDIA GPU Confidential Computing Demystified