Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses // Subhajit Dutta Chowdhury.
Author:
Dutta Chowdhury, Subhajit,
Description:
1 electronic resource (188 pages)
Notes:
Source: Dissertations Abstracts International, Volume: 86-03, Section: B.
Contained By:
Dissertations Abstracts International86-03B.
Subject:
Electrical engineering. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=31561813
ISBN:
9798384456186
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses /
Dutta Chowdhury, Subhajit,
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses /
Subhajit Dutta Chowdhury. - 1 electronic resource (188 pages)
Source: Dissertations Abstracts International, Volume: 86-03, Section: B.
The burgeoning costs of integrated circuit (IC) fabrication have led to widespread globalization of the IC supply chain, exposing IC designs to hardware security threats like intellectual property (IP) theft or piracy, illegal overproduction, and hardware Trojan insertion. These security challenges have triggered research on the exploration of secure design methodologies. However, the security solutions are often incomplete, leaving new channels of sensitive information leakage which must be considered. In this dissertation, we introduce novel analysis methods, attacks, and defenses based on graph learning, and specifically graph neural networks (GNNs), to address some of the information leakage challenges to trustworthy ICs. GNNs are particularly effective in processing circuit netlists, which are inherently graph-structured data. They can leverage the node properties of a circuit netlist and their neighborhood information to successfully perform different tasks. First, we present a state register identification technique with GNNs (ReIGNN) that enables circuit reverse engineering for hardware protection. ReIGNN combines, for the first time, GNNs with structural analysis to identify the state registers and help recover the control logic of a design. We then present a graph learning-driven attack (GLEAN) for analyzing the security guarantees of different logic obfuscation (or locking) methods by assessing the level of information leakage from their structural signatures. Graph learning can also be used to detect topologically and functionally similar logic gates or wires in a design, which in turn can be used to confuse existing machine learning-based attacks on logic obfuscation. In this context, we introduce a graph similarity-based logic locking technique (SimLL) which is the state-of-the-art defense against existing oracle-less learning-based attacks. We also introduce a reconfigurable logic-based locking technique which improves resilience against existing oracle-based attacks. Reconfigurable logic blocks like look-up table (LUT), and switch-boxes reduce the amount of information leaked from their structural signatures making them resilient against machine learning-based attacks too.Finally, security is a major concern for GNN models too. GNN models are highly vulnerable to adversarial attacks, where imperceptible perturbations to the input data can significantly impact their performance. To mitigate this vulnerability, we present a GNN training method that yields models that are sparse and compressed, yet adversarially robust. Overall, this dissertation explores the intersection of graph learning and hardware security highlighting the critical role of graph learning in fortifying hardware security as well as the importance of security considerations in graph learning.
English
ISBN: 9798384456186Subjects--Topical Terms:
596380
Electrical engineering.
Subjects--Index Terms:
Machine learning
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses /
LDR
:04388nam a22004573i 4500
001
1157872
005
20250603111432.5
006
m o d
007
cr|nu||||||||
008
250804s2024 miu||||||m |||||||eng d
020
$a
9798384456186
035
$a
(MiAaPQD)AAI31561813
035
$a
AAI31561813
040
$a
MiAaPQD
$b
eng
$c
MiAaPQD
$e
rda
100
1
$a
Dutta Chowdhury, Subhajit,
$e
author.
$3
1484155
245
1 0
$a
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses /
$c
Subhajit Dutta Chowdhury.
264
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2024
300
$a
1 electronic resource (188 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertations Abstracts International, Volume: 86-03, Section: B.
500
$a
Advisors: Nuzzo, Pierluigi Committee members: Beerel, Peter; Nakano, Aiichiro.
502
$b
Ph.D.
$c
University of Southern California
$d
2024.
520
$a
The burgeoning costs of integrated circuit (IC) fabrication have led to widespread globalization of the IC supply chain, exposing IC designs to hardware security threats like intellectual property (IP) theft or piracy, illegal overproduction, and hardware Trojan insertion. These security challenges have triggered research on the exploration of secure design methodologies. However, the security solutions are often incomplete, leaving new channels of sensitive information leakage which must be considered. In this dissertation, we introduce novel analysis methods, attacks, and defenses based on graph learning, and specifically graph neural networks (GNNs), to address some of the information leakage challenges to trustworthy ICs. GNNs are particularly effective in processing circuit netlists, which are inherently graph-structured data. They can leverage the node properties of a circuit netlist and their neighborhood information to successfully perform different tasks. First, we present a state register identification technique with GNNs (ReIGNN) that enables circuit reverse engineering for hardware protection. ReIGNN combines, for the first time, GNNs with structural analysis to identify the state registers and help recover the control logic of a design. We then present a graph learning-driven attack (GLEAN) for analyzing the security guarantees of different logic obfuscation (or locking) methods by assessing the level of information leakage from their structural signatures. Graph learning can also be used to detect topologically and functionally similar logic gates or wires in a design, which in turn can be used to confuse existing machine learning-based attacks on logic obfuscation. In this context, we introduce a graph similarity-based logic locking technique (SimLL) which is the state-of-the-art defense against existing oracle-less learning-based attacks. We also introduce a reconfigurable logic-based locking technique which improves resilience against existing oracle-based attacks. Reconfigurable logic blocks like look-up table (LUT), and switch-boxes reduce the amount of information leaked from their structural signatures making them resilient against machine learning-based attacks too.Finally, security is a major concern for GNN models too. GNN models are highly vulnerable to adversarial attacks, where imperceptible perturbations to the input data can significantly impact their performance. To mitigate this vulnerability, we present a GNN training method that yields models that are sparse and compressed, yet adversarially robust. Overall, this dissertation explores the intersection of graph learning and hardware security highlighting the critical role of graph learning in fortifying hardware security as well as the importance of security considerations in graph learning.
546
$a
English
590
$a
School code: 0208
650
4
$a
Electrical engineering.
$3
596380
650
4
$a
Computer engineering.
$3
569006
650
4
$a
Engineering.
$3
561152
650
4
$a
Information technology.
$3
559429
653
$a
Machine learning
653
$a
Graph neural networks
653
$a
Hardware security
653
$a
Logic locking
653
$a
Reverse engineering
690
$a
0544
690
$a
0800
690
$a
0464
690
$a
0489
690
$a
0537
710
2
$a
University of Southern California.
$b
Electrical Engineering.
$3
845473
720
1
$a
Nuzzo, Pierluigi
$e
degree supervisor.
773
0
$t
Dissertations Abstracts International
$g
86-03B.
790
$a
0208
791
$a
Ph.D.
792
$a
2024
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=31561813
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login