본문

서브메뉴

Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses.
Contents Info
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses.
자료유형  
 학위논문
Control Number  
0017164145
International Standard Book Number  
9798384456186
Dewey Decimal Classification Number  
621.3
Main Entry-Personal Name  
Dutta Chowdhury, Subhajit.
Publication, Distribution, etc. (Imprint  
[S.l.] : University of Southern California., 2024
Publication, Distribution, etc. (Imprint  
Ann Arbor : ProQuest Dissertations & Theses, 2024
Physical Description  
188 p.
General Note  
Source: Dissertations Abstracts International, Volume: 86-03, Section: B.
General Note  
Advisor: Nuzzo, Pierluigi.
Dissertation Note  
Thesis (Ph.D.)--University of Southern California, 2024.
Summary, Etc.  
요약The burgeoning costs of integrated circuit (IC) fabrication have led to widespread globalization of the IC supply chain, exposing IC designs to hardware security threats like intellectual property (IP) theft or piracy, illegal overproduction, and hardware Trojan insertion. These security challenges have triggered research on the exploration of secure design methodologies. However, the security solutions are often incomplete, leaving new channels of sensitive information leakage which must be considered. In this dissertation, we introduce novel analysis methods, attacks, and defenses based on graph learning, and specifically graph neural networks (GNNs), to address some of the information leakage challenges to trustworthy ICs. GNNs are particularly effective in processing circuit netlists, which are inherently graph-structured data. They can leverage the node properties of a circuit netlist and their neighborhood information to successfully perform different tasks. First, we present a state register identification technique with GNNs (ReIGNN) that enables circuit reverse engineering for hardware protection. ReIGNN combines, for the first time, GNNs with structural analysis to identify the state registers and help recover the control logic of a design. We then present a graph learning-driven attack (GLEAN) for analyzing the security guarantees of different logic obfuscation (or locking) methods by assessing the level of information leakage from their structural signatures. Graph learning can also be used to detect topologically and functionally similar logic gates or wires in a design, which in turn can be used to confuse existing machine learning-based attacks on logic obfuscation. In this context, we introduce a graph similarity-based logic locking technique (SimLL) which is the state-of-the-art defense against existing oracle-less learning-based attacks. We also introduce a reconfigurable logic-based locking technique which improves resilience against existing oracle-based attacks. Reconfigurable logic blocks like look-up table (LUT), and switch-boxes reduce the amount of information leaked from their structural signatures making them resilient against machine learning-based attacks too.Finally, security is a major concern for GNN models too. GNN models are highly vulnerable to adversarial attacks, where imperceptible perturbations to the input data can significantly impact their performance. To mitigate this vulnerability, we present a GNN training method that yields models that are sparse and compressed, yet adversarially robust. Overall, this dissertation explores the intersection of graph learning and hardware security highlighting the critical role of graph learning in fortifying hardware security as well as the importance of security considerations in graph learning. 
Subject Added Entry-Topical Term  
Electrical engineering.
Subject Added Entry-Topical Term  
Computer engineering.
Subject Added Entry-Topical Term  
Engineering.
Subject Added Entry-Topical Term  
Information technology.
Index Term-Uncontrolled  
Machine learning
Index Term-Uncontrolled  
Graph neural networks
Index Term-Uncontrolled  
Hardware security
Index Term-Uncontrolled  
Logic locking
Index Term-Uncontrolled  
Reverse engineering
Added Entry-Corporate Name  
University of Southern California Electrical Engineering
Host Item Entry  
Dissertations Abstracts International. 86-03B.
Electronic Location and Access  
로그인을 한후 보실 수 있는 자료입니다.
Control Number  
joongbu:657518
New Books MORE
최근 3년간 통계입니다.

detalle info

  • Reserva
  • 캠퍼스간 도서대출
  • 서가에 없는 책 신고
  • Mi carpeta
Material
número de libro número de llamada Ubicación estado Prestar info
TQ0033736 T   원문자료 열람가능/출력가능 열람가능/출력가능
마이폴더 부재도서신고

* Las reservas están disponibles en el libro de préstamos. Para hacer reservaciones, haga clic en el botón de reserva

해당 도서를 다른 이용자가 함께 대출한 도서

Related books

Related Popular Books

도서위치