語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses // Subhajit Dutta Chowdhury.
作者:
Dutta Chowdhury, Subhajit,
面頁冊數:
1 electronic resource (188 pages)
附註:
Source: Dissertations Abstracts International, Volume: 86-03, Section: B.
Contained By:
Dissertations Abstracts International86-03B.
標題:
Information technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=31561813
ISBN:
9798384456186
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses /
Dutta Chowdhury, Subhajit,
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses /
Subhajit Dutta Chowdhury. - 1 electronic resource (188 pages)
Source: Dissertations Abstracts International, Volume: 86-03, Section: B.
The burgeoning costs of integrated circuit (IC) fabrication have led to widespread globalization of the IC supply chain, exposing IC designs to hardware security threats like intellectual property (IP) theft or piracy, illegal overproduction, and hardware Trojan insertion. These security challenges have triggered research on the exploration of secure design methodologies. However, the security solutions are often incomplete, leaving new channels of sensitive information leakage which must be considered. In this dissertation, we introduce novel analysis methods, attacks, and defenses based on graph learning, and specifically graph neural networks (GNNs), to address some of the information leakage challenges to trustworthy ICs. GNNs are particularly effective in processing circuit netlists, which are inherently graph-structured data. They can leverage the node properties of a circuit netlist and their neighborhood information to successfully perform different tasks. First, we present a state register identification technique with GNNs (ReIGNN) that enables circuit reverse engineering for hardware protection. ReIGNN combines, for the first time, GNNs with structural analysis to identify the state registers and help recover the control logic of a design. We then present a graph learning-driven attack (GLEAN) for analyzing the security guarantees of different logic obfuscation (or locking) methods by assessing the level of information leakage from their structural signatures. Graph learning can also be used to detect topologically and functionally similar logic gates or wires in a design, which in turn can be used to confuse existing machine learning-based attacks on logic obfuscation. In this context, we introduce a graph similarity-based logic locking technique (SimLL) which is the state-of-the-art defense against existing oracle-less learning-based attacks. We also introduce a reconfigurable logic-based locking technique which improves resilience against existing oracle-based attacks. Reconfigurable logic blocks like look-up table (LUT), and switch-boxes reduce the amount of information leaked from their structural signatures making them resilient against machine learning-based attacks too.Finally, security is a major concern for GNN models too. GNN models are highly vulnerable to adversarial attacks, where imperceptible perturbations to the input data can significantly impact their performance. To mitigate this vulnerability, we present a GNN training method that yields models that are sparse and compressed, yet adversarially robust. Overall, this dissertation explores the intersection of graph learning and hardware security highlighting the critical role of graph learning in fortifying hardware security as well as the importance of security considerations in graph learning.
English
ISBN: 9798384456186Subjects--Topical Terms:
559429
Information technology.
Subjects--Index Terms:
Machine learning
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses /
LDR
:04388nam a22004573i 4500
001
1157872
005
20250603111432.5
006
m o d
007
cr|nu||||||||
008
250804s2024 miu||||||m |||||||eng d
020
$a
9798384456186
035
$a
(MiAaPQD)AAI31561813
035
$a
AAI31561813
040
$a
MiAaPQD
$b
eng
$c
MiAaPQD
$e
rda
100
1
$a
Dutta Chowdhury, Subhajit,
$e
author.
$3
1484155
245
1 0
$a
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses /
$c
Subhajit Dutta Chowdhury.
264
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2024
300
$a
1 electronic resource (188 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertations Abstracts International, Volume: 86-03, Section: B.
500
$a
Advisors: Nuzzo, Pierluigi Committee members: Beerel, Peter; Nakano, Aiichiro.
502
$b
Ph.D.
$c
University of Southern California
$d
2024.
520
$a
The burgeoning costs of integrated circuit (IC) fabrication have led to widespread globalization of the IC supply chain, exposing IC designs to hardware security threats like intellectual property (IP) theft or piracy, illegal overproduction, and hardware Trojan insertion. These security challenges have triggered research on the exploration of secure design methodologies. However, the security solutions are often incomplete, leaving new channels of sensitive information leakage which must be considered. In this dissertation, we introduce novel analysis methods, attacks, and defenses based on graph learning, and specifically graph neural networks (GNNs), to address some of the information leakage challenges to trustworthy ICs. GNNs are particularly effective in processing circuit netlists, which are inherently graph-structured data. They can leverage the node properties of a circuit netlist and their neighborhood information to successfully perform different tasks. First, we present a state register identification technique with GNNs (ReIGNN) that enables circuit reverse engineering for hardware protection. ReIGNN combines, for the first time, GNNs with structural analysis to identify the state registers and help recover the control logic of a design. We then present a graph learning-driven attack (GLEAN) for analyzing the security guarantees of different logic obfuscation (or locking) methods by assessing the level of information leakage from their structural signatures. Graph learning can also be used to detect topologically and functionally similar logic gates or wires in a design, which in turn can be used to confuse existing machine learning-based attacks on logic obfuscation. In this context, we introduce a graph similarity-based logic locking technique (SimLL) which is the state-of-the-art defense against existing oracle-less learning-based attacks. We also introduce a reconfigurable logic-based locking technique which improves resilience against existing oracle-based attacks. Reconfigurable logic blocks like look-up table (LUT), and switch-boxes reduce the amount of information leaked from their structural signatures making them resilient against machine learning-based attacks too.Finally, security is a major concern for GNN models too. GNN models are highly vulnerable to adversarial attacks, where imperceptible perturbations to the input data can significantly impact their performance. To mitigate this vulnerability, we present a GNN training method that yields models that are sparse and compressed, yet adversarially robust. Overall, this dissertation explores the intersection of graph learning and hardware security highlighting the critical role of graph learning in fortifying hardware security as well as the importance of security considerations in graph learning.
546
$a
English
590
$a
School code: 0208
650
4
$a
Information technology.
$3
559429
650
4
$a
Engineering.
$3
561152
650
4
$a
Computer engineering.
$3
569006
650
4
$a
Electrical engineering.
$3
596380
653
$a
Machine learning
653
$a
Graph neural networks
653
$a
Hardware security
653
$a
Logic locking
653
$a
Reverse engineering
690
$a
0544
690
$a
0800
690
$a
0464
690
$a
0489
690
$a
0537
710
2
$a
University of Southern California.
$b
Electrical Engineering.
$3
845473
720
1
$a
Nuzzo, Pierluigi
$e
degree supervisor.
773
0
$t
Dissertations Abstracts International
$g
86-03B.
790
$a
0208
791
$a
Ph.D.
792
$a
2024
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=31561813
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入