skip to main content
10.1145/3508352.3561096acmconferencesArticle/Chapter ViewAbstractPublication PagesiccadConference Proceedingsconference-collections
invited-talk

Embracing Graph Neural Networks for Hardware Security

Published: 22 December 2022 Publication History

Abstract

Graph neural networks (GNNs) have attracted increasing attention due to their superior performance in deep learning on graph-structured data. GNNs have succeeded across various domains such as social networks, chemistry, and electronic design automation (EDA). Electronic circuits have a long history of being represented as graphs, and to no surprise, GNNs have demonstrated state-of-the-art performance in solving various EDA tasks. More importantly, GNNs are now employed to address several hardware security problems, such as detecting intellectual property (IP) piracy and hardware Trojans (HTs), to name a few.
In this survey, we first provide a comprehensive overview of the usage of GNNs in hardware security and propose the first taxonomy to divide the state-of-the-art GNN-based hardware security systems into four categories: (i) HT detection systems, (ii) IP piracy detection systems, (iii) reverse engineering platforms, and (iv) attacks on logic locking. We summarize the different architectures, graph types, node features, benchmark data sets, and model evaluation of the employed GNNs. Finally, we elaborate on the lessons learned and discuss future directions.

References

[1]
Ramish Zafar. TSMC's Total 3nm Investment Will Equal At Least $ 23 Billion. https://wccftech.com/tsmc-3nm-investment-23--billion-project-end/, 2021. [Online; accessed 28-April-2021].
[2]
Masoud Rostami, Farinaz Koushanfar, and Ramesh Karri. A Primer on Hardware Security: Models, Methods, and Metrics. Proc. of the IEEE, 102(8):1283--1295, 2014.
[3]
Thomas N. Kipf and Max Welling. Semi-supervised classification with graph convolutional networks. In International Conference on Learning Representations (ICLR), 2017.
[4]
Will Hamilton, Zhitao Ying, and Jure Leskovec. Inductive representation learning on large graphs. In NIPS, pages 1025--1035, 2017.
[5]
Petar Veličković, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. Graph attention networks. In International Conference on Learning Representations (ICLR), 2018.
[6]
Danfei Xu, Yuke Zhu, Christopher B Choy, and Li Fei-Fei. Scene graph generation by iterative message passing. In IEEE conference on computer vision and pattern recognition (CVPR), pages 5410--5419, 2017.
[7]
Huaxiu Yao et al. Deep multi-view spatial-temporal network for taxi demand prediction. In The AAAI Conference on Artificial Intelligence, volume 32, 2018.
[8]
Rex Ying, Ruining He, Kaifeng Chen, Pong Eksombatchai, William L Hamilton, and Jure Leskovec. Graph convolutional neural networks for web-scale recommender systems. In ACM SIGKDD international conference on knowledge discovery & data mining, pages 974--983, 2018.
[9]
Azalia Mirhoseini et al. A graph placement methodology for fast chip design. Nature, 594(7862):207--212, 2021.
[10]
Robert Kirby et al. CongestionNet: Routing congestion prediction using deep graph neural networks. In IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), pages 217--222, 2019.
[11]
Rozhin Yasaei, Shih-Yuan Yu, and Mohammad Abdullah Al Faruque. GNN4TJ: Graph neural networks for hardware trojan detection at register transfer level. In Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 1504--1509, 2021.
[12]
Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, and Mohammad Abdullah Al Faruque. HW2VEC: A graph learning tool for automating hardware security. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 13--23, 2021.
[13]
Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, and Nozomu Togawa. Node-wise hardware trojan detection based on graph learning. arXiv preprint arXiv:2112.02213, 2021.
[14]
Nikhil Muralidhar, Abdullah Zubair, Nathanael Weidler, Ryan Gerdes, and Naren Ramakrishnan. Contrastive graph convolutional networks for hardware trojan detection in third party IP cores. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2021.
[15]
Dong Cheng, Chen Dong, Wenwu He, Zhenyi Chen, and Yi Xu. GNN4Gate: A bi-directional graph neural network for gate-level hardware trojan detection. In Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 1315--1320, 2022.
[16]
Rozhin Yasaei, Shih-Yuan Yu, Emad Kasaeyan Naeini, and Mohammad Abdullah Al Faruque. GNN4IP: Graph neural network for hardware intellectual property piracy detection. arXiv preprint arXiv:2107.09130, 2021.
[17]
Subhajit Dutta Chowdhury, Kaixin Yang, and Pierluigi Nuzzo. ReIGNN: State register identification using graph neural networks for circuit reverse engineering. In IEEE/ACM International Conference On Computer Aided Design (ICCAD), pages 1--9, 2021.
[18]
Lilas Alrahis, Abhrajit Sengupta, Johann Knechtel, Satwik Patnaik, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, and Ozgur Sinanoglu. GNN-RE: Graph neural networks for reverse engineering of gate-level netlists. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 41(8):2435--2448, 2022.
[19]
Kimia Zamiri Azar et al. NNgSAT: Neural network guided sat attack on logic locked complex structures. In IEEE/ACM International Conference On Computer Aided Design (ICCAD), pages 1--9, 2020.
[20]
Lilas Alrahis, Satwik Patnaik, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, and Ozgur Sinanoglu. GNNUnlock+: A systematic methodology for designing graph neural networks-based oracle-less unlocking schemes for provably secure logic locking. IEEE Transactions on Emerging Topics in Computing, pages 1--1, 2021.
[21]
Lilas Alrahis, Satwik Patnaik, Muhammad Shafique, and Ozgur Sinanoglu. OMLA: An oracle-less machine learning-based attack on logic locking. IEEE Transactions on Circuits and Systems II: Express Briefs, 69(3):1602--1606, 2022.
[22]
Lilas Alrahis, Satwik Patnaik, Muhammad Abdullah Hanif, Muhammad Shafique, and Ozgur Sinanoglu. UNTANGLE: Unlocking routing and logic obfuscation using graph neural networks-based link prediction. In IEEE/ACM International Conference On Computer Aided Design (ICCAD), pages 1--9, 2021.
[23]
Zhiqian Chen, Gaurav Kolhe, Setareh Rafatirad, Chang-Tien Lu, Sai Manoj PD, Houman Homayoun, and Liang Zhao. Estimating the circuit de-obfuscation runtime based on graph deep learning. In Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 358--363. IEEE, 2020.
[24]
Mohammad Tehranipoor and Farinaz Koushanfar. A survey of hardware Trojan taxonomy and detection. IEEE design & test of computers, 27(1):10--25, 2010.
[25]
Randy Torrance and Dick James. The state-of-the-art in ic reverse engineering. In International Workshop on Cryptographic Hardware and Embedded Systems, pages 363--381. Springer, 2009.
[26]
The most cost-effective way to get critical analysis. URL https://www.techinsights.com/analysis-solutions/reverse-engineering/.
[27]
Johann Knechtel, Satwik Patnaik, and Ozgur Sinanoglu. Protect your chip design intellectual property: An overview. In Proceedings of the International Conference on Omni-Layer Intelligent Systems, pages 211--216, 2019.
[28]
Satwik Patnaik, Nikhil Rangarajan, Johann Knechtel, Ozgur Sinanoglu, and Shaloo Rakheja. Advancing hardware security using polymorphic and stochastic spin-hall effect devices. In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 97--102. IEEE, 2018.
[29]
Jeyavijayan Rajendran, Michael Sam, Ozgur Sinanoglu, and Ramesh Karri. Security analysis of integrated circuit camouflaging. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 709--720, 2013.
[30]
Satwik Patnaik, Mohammed Ashraf, Ozgur Sinanoglu, and Johann Knechtel. Obfuscating the interconnects: Low-cost and resilient full-chip layout camouflaging. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(12):4466--4481, 2020.
[31]
Jeyavijayan Rajendran, Ozgur Sinanoglu, and Ramesh Karri. Is split manufacturing secure? In 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 1259--1264. IEEE, 2013.
[32]
Satwik Patnaik, Mohammed Ashraf, Haocheng Li, Johann Knechtel, and Ozgur Sinanoglu. Concerted wire lifting: Enabling secure and cost-effective split manufacturing. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 41(2):266--280, 2021.
[33]
P. Subramanyan, S. Ray, and S. Malik. Evaluating the Security of Logic Encryption Algorithms. In IEEE HOST, pages 137--143, 2015.
[34]
Deepak Sirone and Pramod Subramanyan. Functional Analysis Attacks on Logic Locking. IEEE TIFS, 15:2514--2527, 2020. URL https://bitbucket.org/spramod/fall-attacks/src/master/.
[35]
Leon Li and Alex Orailoglu. Piercing logic locking keys through redundancy identification. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 540--545, 2019.
[36]
Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, and Jeyavijayan Rajendran. Removal attacks on logic locking and camouflaging techniques. IEEE Transactions on Emerging Topics in Computing, 8(2):517--532, 2020.
[37]
Nimisha Limaye, Satwik Patnaik, and Ozgur Sinanoglu. Valkyrie: Vulnerability assessment tool and attack for provably-secure logic locking techniques. IEEE Transactions on Information Forensics and Security, 17:744--759, 2022.
[38]
David Liben-Nowell and Jon Kleinberg. The link-prediction problem for social networks. Journal of the American society for information science and technology, 58(7):1019--1031, 2007.
[39]
Lada A Adamic and Eytan Adar. Friends and neighbors on the web. Social networks, 25(3):211--230, 2003.
[40]
Yanjun Qi, Ziv Bar-Joseph, and Judith Klein-Seetharaman. Evaluation of different biological data and computational classification methods for use in protein interaction prediction. Proteins: Structure, Function, and Bioinformatics, 63(3): 490--500, 2006.
[41]
Zachary Stanfield, Mustafa Coşkun, and Mehmet Koyutürk. Drug response prediction as a link prediction problem. Scientific reports, 7(1):1--13, 2017.
[42]
Muhan Zhang and Yixin Chen. Link prediction based on graph neural networks. In Proceedings of the 32nd International Conference on Neural Information Processing Systems, NIPS'18, page 5171--5181, Red Hook, NY, USA, 2018. Curran Associates Inc.
[43]
Muhan Zhang, Zhicheng Cui, Marion Neumann, and Yixin Chen. An end-to-end deep learning architecture for graph classification. In Proceedings of the AAAI conference on artificial intelligence, volume 32, 2018.
[44]
Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. How powerful are graph neural networks? In ICLR, 2019.
[45]
Rozhin Yasaei, Shih-Yuan Yu, Emad Kasaeyan Naeini, and Mohammad Abdullah Al Faruque. GNN4IP: Graph neural network for hardware intellectual property piracy detection. In 2021 58th ACM/IEEE Design Automation Conference (DAC), pages 217--222, 2021.
[46]
Ziyi Wang, Chen Bai, Zhuolun He, Guangliang Zhang, Qiang Xu, Tsung-Yi Ho, Bei Yu, and Yu Huang. Functionality matters in netlist representation learning. In Design Automation Conference (DAC), pages 1--6, 2022.
[47]
Zhuolun He, Ziyi Wang, Chen Bail, Haoyu Yang, and Bei Yu. Graph learning-based arithmetic block identification. In IEEE/ACM International Conference On Computer Aided Design (ICCAD), pages 1--8. IEEE, 2021.
[48]
Guangwei Zhao and Kaveh Shamsi. Graph neural network based netlist operator detection under circuit rewriting. In Proceedings of the Great Lakes Symposium on VLSI 2022, pages 53--58, 2022.
[49]
Lilas Alrahis, Satwik Patnaik, Muhammad Shafique, and Ozgur Sinanoglu. MuxLink: Circumventing learning-resilient mux-locking using graph neural network-based link prediction. In Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 694--699, 2022.
[50]
Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, and Ozgur Sinanoglu. GNNUnlock: Graph neural networks-based oracle-less unlocking scheme for provably secure logic locking. In IEEE/ACM Design, Automation and Test in Europe Conference, pages 780--785, 2021.
[51]
Hanqing Zeng, Hongkuan Zhou, Ajitesh Srivastava, Rajgopal Kannan, and Viktor Prasanna. GraphSAINT: Graph Sampling Based Inductive Learning Method. In ICLR, 2019. URL https://github.com/GraphSAINT/GraphSAINT.
[52]
Matthew Hicks, Murph Finnicum, Samuel T King, Milo MK Martin, and Jonathan M Smith. Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In IEEE Symposium on Security and Privacy (S&P), pages 159--172, 2010.
[53]
Yuanwen Huang, Swarup Bhunia, and Prabhat Mishra. Scalable test generation for Trojan detection using side channel analysis. IEEE Transactions on Information Forensics and Security, 13(11):2746--2760, 2018.
[54]
Oliver Kömmerling and Markus G Kuhn. Design principles for tamper-resistant smartcard processors. In USENIX Workshop on Smartcard Technology, 1999.
[55]
Karsten Nohl et al. Reverse-engineering a cryptographic RFID tag. In USENIX security symposium, volume 28, 2008.
[56]
Chongxi Bao, Domenic Forte, and Ankur Srivastava. On reverse engineering-based hardware Trojan detection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 35(1):49--57, 2015.
[57]
Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, and Christof Paar. Graph similarity and its applications to hardware security. IEEE Transactions on Computers, 69(4):505--519, 2019.
[58]
Rajat Subhra Chakraborty, Somnath Paul, and Swarup Bhunia. On-demand transparency for improving hardware Trojan detectability. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 48--50, 2008.
[59]
Yousra Alkabani, Farinaz Koushanfar, and Miodrag Potkonjak. Remote activation of ICs for piracy prevention and digital right management. In IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pages 674--677, 2007.
[60]
Aijiao Cui, Gang Qu, and Yan Zhang. Ultra-low overhead dynamic watermarking on scan design for hard ip protection. IEEE Transactions on Information Forensics and Security, 10(11):2298--2313, 2015.
[61]
Wenchao Li, Adria Gascon, Pramod Subramanyan, Wei Yang Tan, Ashish Tiwari, Sharad Malik, Natarajan Shankar, and Sanjit A Seshia. WordRev: Finding word-level structures in a sea of bit-level gates. In IEEE international symposium on hardware-oriented security and trust (HOST), pages 67--74, 2013.
[62]
Wenchao Li, Zach Wasson, and Sanjit A Seshia. Reverse engineering circuits using behavioral pattern mining. In IEEE International Symposium on Hardware-oriented Security and Trust (HOST), pages 83--88, 2012.
[63]
Pramod Subramanyan, Nestan Tsiskaridze, Wenchao Li, Adria Gascón, Wei Yang Tan, Ashish Tiwari, Natarajan Shankar, Sanjit A Seshia, and Sharad Malik. Reverse engineering digital circuits using structural and functional analyses. IEEE Transactions on Emerging Topics in Computing, 2(1):63--80, 2013.
[64]
Adria Gascón, Pramod Subramanyan, Bruno Dutertre, Ashish Tiwari, Dejan Jovanović, and Sharad Malik. Template-based circuit understanding. In Formal Methods in Computer-Aided Design (FMCAD), pages 83--90. IEEE, 2014.
[65]
Johanna Baehr, Alessandro Bernardini, Georg Sigl, and Ulf Schlichtmann. Machine learning and structural characteristics for reverse engineering. Integration, 72:1--12, 2020.
[66]
Dominik Sisejkovic, Lennart M. Reimann, Elmira Moussavi, Farhad Merchant, and Rainer Leupers. Logic locking at the frontiers of machine learning: A survey on developments and opportunities. In 2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), pages 1--6, 2021.
[67]
J.A. Roy, F. Koushanfar, and Igor L Markov. Ending Piracy of Integrated Circuits. IEEE Computer, 43(10):30--38, 2010.
[68]
M. Yasin, J. Rajendran, O. Sinanoglu, and R. Karri. On Improving the Security of Logic Locking. IEEE TCAD, 35(9):1411--1424, 2016.
[69]
J. Rajendran, Huan Zhang, Chi Zhang, G.S. Rose, Youngok Pino, O. Sinanoglu, and R. Karri. Fault Analysis-Based Logic Encryption. IEEE Computer, 64(2): 410--424, 2015.
[70]
Prabuddha Chakraborty, Jonathan Cruz, Abdulrahman Alaql, and Swarup Bhunia. SAIL: Analyzing structural artifacts of logic locking using machine learning. IEEE TIFS, 16:3828--3842, 2021.
[71]
Dominik Sisejkovic, Farhad Merchant, Lennart M. Reimann, Harshit Srivastava, Ahmed Hallawa, and Rainer Leupers. Challenging the security of logic locking schemes in the era of deep learning: A neuroevolutionary approach. JETC, 17(3), May 2021. ISSN 1550-4832.
[72]
Dominik Sisejkovic, Farhad Merchant, Lennart M Reimann, and Rainer Leupers. Deceptive logic locking for hardware integrity protection against machine learning attacks. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021.
[73]
Abdulrahman Alaql, Md Moshiur Rahman, and Swarup Bhunia. SCOPE: synthesis-based constant propagation attack on logic locking. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2021.
[74]
Debasri Saha and Susmita Sur-Kolay. SoC: a real platform for IP reuse, IP infringement, and IP protection. VLSI Design, 2011, 2011.
[75]
H. M. Kamali, K. Z. Azar, H. Homayoun, and A. Sasan. InterLock: An intercorrelated logic and routing locking. In 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pages 1--9, 2020.
[76]
Robert Tibshirani. Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society. Series B (Methodological), pages 267--288, 1996.
[77]
Alex J Smola and Bernhard Schölkopf. A tutorial on support vector regression. Statistics and computing, 14(3):199--222, 2004.
[78]
Andrew Y Ng. Feature selection, l 1 vs. l 2 regularization, and rotational invariance. In Proceedings of the twenty-first international conference on Machine learning, page 78. ACM, 2004.
[79]
Hui Zou and Trevor Hastie. Regularization and variable selection via the elastic net. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 67(2):301--320, 2005.
[80]
Stéphane G Mallat and Zhifeng Zhang. Matching pursuits with time-frequency dictionaries. IEEE Transactions on signal processing, 41(12):3397--3415, 1993.
[81]
Bradley Efron, Trevor Hastie, Iain Johnstone, Robert Tibshirani, et al. Least angle regression. The Annals of statistics, 32(2):407--499, 2004.
[82]
Xin Dang, Hanxiang Peng, Xueqin Wang, and Heping Zhang. Theil-sen estimators in a multiple linear regression model. Olemiss. edu, 2008.

Cited By

View all
  • (2025)NtNDet: Hardware Trojan detection based on pre-trained language modelsExpert Systems with Applications10.1016/j.eswa.2025.126666271(126666)Online publication date: May-2025
  • (2025)Uncertainty-Aware Unimodal and Multimodal Learning for Evolving Hardware Trojan DetectionJournal of Hardware and Systems Security10.1007/s41635-025-00160-2Online publication date: 26-Feb-2025
  • (2024)GAN4IP: A unified GAN and logic locking-based pipeline for hardware IP securitySādhanā10.1007/s12046-024-02461-849:2Online publication date: 5-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICCAD '22: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design
October 2022
1467 pages
ISBN:9781450392174
DOI:10.1145/3508352
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

In-Cooperation

  • IEEE-EDS: Electronic Devices Society
  • IEEE CAS
  • IEEE CEDA

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 December 2022

Check for updates

Author Tags

  1. graph neural networks
  2. hardware security
  3. hardware trojans
  4. intellectual property piracy
  5. logic locking
  6. reverse engineering
  7. survey

Qualifiers

  • Invited-talk

Conference

ICCAD '22
Sponsor:
ICCAD '22: IEEE/ACM International Conference on Computer-Aided Design
October 30 - November 3, 2022
California, San Diego

Acceptance Rates

Overall Acceptance Rate 457 of 1,762 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)135
  • Downloads (Last 6 weeks)12
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)NtNDet: Hardware Trojan detection based on pre-trained language modelsExpert Systems with Applications10.1016/j.eswa.2025.126666271(126666)Online publication date: May-2025
  • (2025)Uncertainty-Aware Unimodal and Multimodal Learning for Evolving Hardware Trojan DetectionJournal of Hardware and Systems Security10.1007/s41635-025-00160-2Online publication date: 26-Feb-2025
  • (2024)GAN4IP: A unified GAN and logic locking-based pipeline for hardware IP securitySādhanā10.1007/s12046-024-02461-849:2Online publication date: 5-May-2024
  • (2023)Graph Neural NetworksProceedings of the 28th Asia and South Pacific Design Automation Conference10.1145/3566097.3568345(83-90)Online publication date: 16-Jan-2023
  • (2023)Graph Neural Networks for Hardware Vulnerability Analysis— Can you Trust your GNN?2023 IEEE 41st VLSI Test Symposium (VTS)10.1109/VTS56346.2023.10140095(1-4)Online publication date: 24-Apr-2023
  • (2023)$\tt{PoisonedGNN}$: Backdoor Attack on Graph Neural Networks-Based Hardware Security SystemsIEEE Transactions on Computers10.1109/TC.2023.327112672:10(2822-2834)Online publication date: 1-Oct-2023
  • (2023)Characterize the ability of GNNs in attacking logic locking2023 ACM/IEEE 5th Workshop on Machine Learning for CAD (MLCAD)10.1109/MLCAD58807.2023.10299817(1-6)Online publication date: 10-Sep-2023
  • (2023)TrojanSAINT: Gate-Level Netlist Sampling-Based Inductive Learning for Hardware Trojan Detection2023 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS46773.2023.10181403(1-5)Online publication date: 21-May-2023
  • (2023)Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)10.1109/ICCAD57390.2023.10323655(01-09)Online publication date: 28-Oct-2023
  • (2023)On the Prediction of Hardware Security Properties of HLS Designs Using Graph Neural Networks2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)10.1109/DFT59622.2023.10313544(1-6)Online publication date: 3-Oct-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media