Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design 2022
DOI: 10.1145/3508352.3561096
|View full text |Cite
|
Sign up to set email alerts
|

Embracing Graph Neural Networks for Hardware Security

Abstract: Graph neural networks (GNNs) have shown great success in detecting intellectual property (IP) piracy and hardware Trojans (HTs). However, the machine learning community has demonstrated that GNNs are susceptible to data poisoning attacks, which result in GNNs performing abnormally on graphs with pre-defined backdoor triggers (realized using crafted subgraphs). Thus, it is imperative to ensure that the adoption of GNNs should not introduce security vulnerabilities in critical security frameworks. Existing backd… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(1 citation statement)
references
References 70 publications
0
1
0
Order By: Relevance
“…Hardware Security: Circuits can be represented as graphs to detect anomalies, such as potential Hardware Trojans. Graph Neural Networks (GNNs) further enhance detection capabilities, pinpointing subtle irregularities [4,76,203].…”
Section: Background and Motivationmentioning
confidence: 99%
“…Hardware Security: Circuits can be represented as graphs to detect anomalies, such as potential Hardware Trojans. Graph Neural Networks (GNNs) further enhance detection capabilities, pinpointing subtle irregularities [4,76,203].…”
Section: Background and Motivationmentioning
confidence: 99%