Discerning Limitations of GNN-based Attacks on Logic Locking

被引:1
|
作者
Darjani, Armin [1 ]
Kavand, Nima [1 ]
Rai, Shubham [1 ]
Kumar, Akash [1 ]
机构
[1] Tech Univ Dresden, Chair Processor Design, CFAED, Dresden, Germany
来源
2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC | 2023年
关键词
Logic locking; Structural attacks; ML-based; GNN;
D O I
10.1109/DAC56929.2023.10247847
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine learning (ML)-based attacks have revealed the possibility of utilizing neural networks to break locked circuits without needing functional chips (Oracle). Among ML approaches, GNN (graph neural networks)-based attacks are the most potent tools that attackers can employ as they exploit graph structures inherent to a circuit's netlist. Although promising, in this paper, we reveal that GNNs have some impediments in attacking locked circuits. We investigate the limits of the state-of-the-art GNN-based attacks against logic locking and show that we can drastically decrease the accuracy of these attacks by utilizing these limitations in the locking process.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Thwarting GNN-Based Attacks Against Logic Locking
    Darjani, Armin
    Kavand, Nima
    Rai, Shubham
    Kumar, Akash
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7200 - 7215
  • [2] Targeted Shilling Attacks on GNN-based Recommender Systems
    Guo, Sihan
    Bai, Ting
    Deng, Weihong
    PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 649 - 658
  • [3] Label-Flipping Attacks in GNN-Based Federated Learning
    Yu, Shanqing
    Shen, Jie
    Xu, Shaocong
    Wang, Jinhuan
    Wang, Zeyu
    Xuan, Qi
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2025, 12 (02): : 1357 - 1368
  • [4] GNN-Based Network Traffic Analysis for the Detection of Sequential Attacks in IoT
    Altaf, Tanzeela
    Wang, Xu
    Ni, Wei
    Yu, Guangsheng
    Liu, Ren Ping
    Braun, Robin
    ELECTRONICS, 2024, 13 (12)
  • [5] Membership Inference Attacks against GNN-based Hardware Trojan Detection
    Hasegawa, Kento
    Yamashita, Kazuki
    Hidano, Seira
    Fukushima, Kazuhide
    Hashimoto, Kazuo
    Togawa, Nozomu
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1222 - 1229
  • [6] Poisoning GNN-based Recommender Systems with Generative Surrogate-based Attacks
    Thanh, Toan Nguyen
    Quach, Nguyen Duc Khang
    Nguyen, Thanh Tam
    Huynh, Thanh Trung
    Vu, Viet Hung
    Le Nguyen, Phi
    Jo, Jun
    Nguyen, Quoc Viet Hung
    ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 41 (03)
  • [7] GNN-based passenger request prediction
    Makhdomi, Aqsa Ashraf
    Gillani, Iqra Altaf
    TRANSPORTATION LETTERS-THE INTERNATIONAL JOURNAL OF TRANSPORTATION RESEARCH, 2024, 16 (10): : 1237 - 1251
  • [8] A2S2-GNN: Rigging GNN-Based Social Status by Adversarial Attacks in Signed Social Networks
    Yin, Xiaoyan
    Lin, Wanyu
    Sun, Kexin
    Wei, Chun
    Chen, Yanjiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 206 - 220
  • [9] Iterative GNN-based Decoder for Question Generation
    Fei, Zichu
    Zhang, Qi
    Zhou, Yaqian
    2021 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING (EMNLP 2021), 2021, : 2573 - 2582
  • [10] Semantics-Preserving Node Injection Attacks Against GNN-Based ACFG Malware Classifiers
    Zapzalka, Dylan
    Salem, Saeed
    Mohaisen, David
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 549 - 560