2022
DOI: 10.3390/electronics11020245
|View full text |Cite
|
Sign up to set email alerts
|

GAINESIS: Generative Artificial Intelligence NEtlists SynthesIS

Abstract: A significant problem in the field of hardware security consists of hardware trojan (HT) viruses. The insertion of HTs into a circuit can be applied for each phase of the circuit chain of production. HTs degrade the infected circuit, destroy it or leak encrypted data. Nowadays, efforts are being made to address HTs through machine learning (ML) techniques, mainly for the gate-level netlist (GLN) phase, but there are some restrictions. Specifically, the number and variety of normal and infected circuits that ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…For deep learning, the size and quality of the dataset are two important fundamental prerequisites. Most of the existing methods use open-source data, such as the RS232-series provided by Trust-Hub, and it is worth mentioning that Liakos et al [40] proposed a new tool, GAINESIS, a WCGAN-based algorithm that synthesizes new samples for experiments. This is a convenient tool for models where it is difficult to extract a sufficient number of samples.…”
Section: ) Traditional Machine Learning Methodsmentioning
confidence: 99%
“…For deep learning, the size and quality of the dataset are two important fundamental prerequisites. Most of the existing methods use open-source data, such as the RS232-series provided by Trust-Hub, and it is worth mentioning that Liakos et al [40] proposed a new tool, GAINESIS, a WCGAN-based algorithm that synthesizes new samples for experiments. This is a convenient tool for models where it is difficult to extract a sufficient number of samples.…”
Section: ) Traditional Machine Learning Methodsmentioning
confidence: 99%
“…Such detectors need significant data (various HTinfected and HT-free circuits) to provide fair and unbiased results. An important problem observed in this space is the imbalance between HT-infected circuits versus HT-free ones, which negatively impacts the quality of the training data [23]. Subsequently, trained detectors can be biased towards favoring circuits as HT-infected, as we will see later in Section VII-B.…”
Section: B Ht Benchmarksmentioning
confidence: 99%
“…Liakos et al [23] employed GANs (Generative Adversarial Networks) to replicate the characteristics of HT-free and HTinfected circuits characteristics, such as structural, power, and timing features. The study utilizes a feature generative approach with GANs to generate synthetic data for training more effective HT detectors.…”
Section: B Ht Benchmarksmentioning
confidence: 99%
“…Because of the threat of HTs, Trojan-detection methods are increasingly being emphasized. In the pre-silicon phase, static-detection techniques can extract and analyze the characteristics of the gate-level netlists to identify suspicious networks without logical or functional simulation, and machine learning methods can be used to classify the unknown networks into Trojan and normal networks efficiently [2][3][4][5]. However, these techniques make it difficult to build perfect models for all ICs.…”
Section: Introductionmentioning
confidence: 99%