Hardware Trojan horse detection method and system based on bidirectional graph convolutional neural network

A convolutional neural network and hardware Trojan detection technology, applied in neural learning methods, biological neural network models, neural architectures, etc., can solve the problems of detecting and locating Trojan structure, low level of abstraction, and many design details, etc., to achieve detection efficiency The effect of high accuracy and high accuracy, avoiding difficult expansion, and getting rid of the burden of manual definition and feature extraction

Pending Publication Date: 2022-02-18
FUZHOU UNIV
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since each level of leap may be implanted into a hardware Trojan horse, the closer to the manufacturing stage the detection has a more defensive effect, but the lower the abstraction level, the more design details, accompanied by the increase in complexity
Most of the current detection work is concentrated on the register transfer level, and it is difficult to detect and locate the relevant Trojan horse structure in large-scale integrated circuits
In general, there is no efficient, automatic and easy-to-expand hardware Trojan detection method and system for the gate level.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection method and system based on bidirectional graph convolutional neural network
  • Hardware Trojan horse detection method and system based on bidirectional graph convolutional neural network
  • Hardware Trojan horse detection method and system based on bidirectional graph convolutional neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The technical solution of the present invention will be specifically described below in conjunction with the accompanying drawings.

[0054] Such as Figure 1-2 As shown, the present invention provides a kind of hardware Trojan detection method based on two-way graph convolution neural network, comprises the following steps:

[0055] Step A, preprocess the collected netlist file, collect the gate device set V in the netlist, and generate the connection edge set E between devices, create a corresponding directed graph representation G=(V, E), and gate device The information is encoded as the feature representation X, and the hardware Trojan horse label Y is marked for each gate device, and the circuit directed graph data is constructed;

[0056] Step A1, collecting gate device types in all netlists to form a gate device type library;

[0057] Step A2, obtain the gate device set V={v from the netlist 0 ,v 1 ,...,v n-1} and net set W={w 0 ,w 1 ,...,w h}, and define...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a hardware Trojan horse detection method and system based on a bidirectional graph convolutional neural network. The method comprises the following steps of firstly, preprocessing a netlist file, creating a corresponding directed graph representation, encoding gate device information as a feature representation X, and constructing circuit directed graph data, respectively creating a forward circuit diagram for describing a circuit signal propagation structure and a reverse circuit diagram for describing a circuit signal dispersion structure, respectively constructing corresponding graph neural network feature extractors to extract structural features, and combining the structural features into final gate device features, constructing a multi-layer perceptron classification model, forming a hardware Trojan horse gate classification model by the multi-layer perceptron classification model and a graph neural network feature extractor, and learning model parameters by using a weighted cross entropy loss function to obtain a trained hardware Trojan horse gate classification model, and converting a to-be-detected netlist into a directed graph, inputting the directed graph into the trained hardware Trojan horse gate classification model for detection, and outputting a suspicious door device list. According to the method, the exit-level hardware Trojan horse can be effectively detected.

Description

technical field [0001] The invention relates to the field of hardware Trojan horse detection, in particular to a hardware Trojan horse detection method and system based on a bidirectional graph convolutional neural network. Background technique [0002] The chip is the basis of the physical network system. With the rapid development of the network, the popularity of electronic equipment is getting higher and higher, and the chip is widely used in different fields. However, due to the high cost and intense competitive pressure, the production process of the chip usually requires the joint participation of multiple manufacturers, which makes it easy for attackers to implant hardware Trojans in the design of large-scale integrated circuits to perform specific malicious operations, resulting in major security risks and damage. Hardware Trojans are mainly implanted in the chip design stage, and the detection cost after chip manufacturing is often very expensive, so it is very im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/71G06K9/62G06N3/04G06N3/08
CPCG06F21/71G06N3/08G06N3/047G06N3/048G06N3/045G06F18/2415G06F18/241
Inventor 董晨程栋林璇威贺文武
Owner FUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products