Skip to main content
Log in

GAN4IP: A unified GAN and logic locking-based pipeline for hardware IP security

  • Published:
Sādhanā Aims and scope Submit manuscript

Abstract

Intellectual property (IP) security has emerged as a critical concern in semiconductor industries. In the domain of hardware IP security, logic locking is a commonly used technique to prevent unauthorized access to IPs. This article proposes a conceptual pipeline to enhance the hardware IP security by leveraging generative models and logic locking concepts (GAN4IP) for hardware IP security. The proposed approach uses the concept of logic locking and generative adversarial networks (GANs) in a unified fashion to design secure hardware IPs. The GAN architecture uses deep learning techniques and graph-based representations of digital circuits to build obfuscated designs that can predict the behavior of locked netlists and generate secure designs. The proposed perspective method opens up new avenues for further investigation of highly secure electronic system design and has the potential to significantly impact the field of hardware IP security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9

Similar content being viewed by others

References

  1. Hardware security modules market https://www.marketsandmarkets.com/Market-Reports/hardware-security-modules-market-162277475.html

  2. Roy J A, Koushanfar F and Markov I L 2008 EPIC: Ending piracy of integrated circuits In: 2008 Design, Automation and Test in Europe, pp. 1069–1074

  3. Gandhi J, Shekhawat D, Santosh M and Pandey J G 2023 Logic locking for IP security: a comprehensive analysis on challenges, techniques, and trends. Comput. Secur. 129: 103196

    Article  Google Scholar 

  4. Alrahis L and Sinanoglu O 2023 Graph neural networks for hardware vulnerability analysis–can you trust your GNN? arXiv preprint arXiv:2303.16690

  5. Chakraborty P, Cruz J and Bhunia S 2018 SAIL: machine learning guided structural analysis attack on hardware obfuscation In: 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 56–61

  6. Alrahis L, Patnaik S, Shafique M and Sinanoglu O 2022 OMLA: an oracle-less machine learning-based attack on logic locking IEEE trans. Circuits Syst. II: Expr. Briefs 69: 1602–1606

    Article  Google Scholar 

  7. Alrahis L, Patnaik S, Shafique M and Sinanoglu O 2022 MuxLink: Circumventing learning-resilient mux-locking using graph neural network-based link prediction. In: 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 694–699

  8. Alrahis L, Patnaik S, Hanif M. A, Shafique M and Sinanoglu O 2021 UNTANGLE: Unlocking routing and logic obfuscation using graph neural networks-based link prediction. In: 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pp. 1–9

  9. Mankali L, Alrahis L, Patnaik S, Knechtel J and Sinanoglu O 2022 Titan: security analysis of large-scale hardware obfuscation using graph neural networks IEEE trans. Inf. Forensics Secur. 18: 304–318

    Article  Google Scholar 

  10. Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A and Bengio Y 2020 Generative adversarial networks. Commun. ACM 63: 139–144

    Article  Google Scholar 

  11. Dutta I K, Ghosh B, Carlson A, Totaro M and Bayoumi M 2020 Generative adversarial networks in security: a survey. In: 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0399–0405

  12. Alrahis L, Knechtel J and Sinanoglu O 2023 Graph neural networks: a powerful and versatile tool for advancing design, reliability, and security of ICs. In: Proceedings of the 28th Asia and South Pacific Design Automation Conference, pp. 83–90

  13. Tauhid A, Xu L, Rahman M and Tomai E 2023 A survey on security analysis of machine learning-oriented hardware and software intellectual property. High-Conf. Comput. 3: 100114

    Article  Google Scholar 

  14. Sisejkovic D, Reimann L M, Moussavi E, Merchant F and Leupers R 2021 Logic locking at the frontiers of machine learning: a survey on developments and opportunities. In: 2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), pp. 1–6

  15. Gandhi J, Shekhawat D, Santosh M and Pandey J G 2023 LOKI: a secure FPGA Prototyping of IoT IP with lightweight logic locking. In: 2023 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)

  16. Gandhi J, Shekhawat D, Santosh M and Pandey J. G 2023 LightLock: ensuring hardware IP security in IoT environment with lightweight logic locking. In: International Symposium on VLSI Design and Test

  17. Pilato C, Chowdhury A. B, Sciuto D, Garg S and Karri R 2020 ASSURE: RTL locking against an untrusted foundry. CoRR. abs/2010.05344

  18. Kamali H M, Azar K Z, Farahmandi F and Tehranipoor M 2022 Advances in logic locking: past, present, and prospects. Cryptol. ePrint Arch.

  19. Yasaei R, Yu S-Y, Naeini E K and Al Faruque M A 2021 GNN4IP: graph neural network for hardware intellectual property piracy detection. In: 2021 58th ACM/IEEE Design Automation Conference (DAC), pp. 217–222

  20. Kahng A, Lach J, Mangione-Smith W, Mantik S, Markov I, Potkonjak M, Tucker P, Wang H and Wolfe G 1998 Watermarking techniques for intellectual property protection. In: Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175), pp. 776–781

  21. Karri R, Rajendran J, Rosenfeld K and Tehranipoor M 2010 Trustworthy hardware: identifying and classifying hardware trojans. Computer 43: 39–46

    Article  Google Scholar 

  22. Huang Z, Wang Q, Chen Y and Jiang X 2020 A survey on machine learning against hardware trojan attacks: recent advances and challenges. IEEE Access 8: 10796–10826

    Article  Google Scholar 

  23. Yasaei R, Chen L, Yu S-Y and Al Faruque M A 2022 Hardware Trojan Detection using Graph Neural Networks. IEEE Trans. Comput.-Aided Design Integr, Circuits Syst. 1–14

  24. Yasaei R, Yu S-Y and Al Faruque M A 2021 GNN4TJ: graph neural networks for hardware Trojan detection at register transfer level. In: 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1504–1509

  25. Sisejkovic D, Collini L, Tan B, Pilato C, Karri R and Leupers R 2022 Designing ML-resilient locking at register-transfer level. arXiv preprint arXiv:2203.05399

  26. Wang Z, Wu Y, Park Y, Yoo S, Wang X, Eshraghian J K and Lu W D 2023 PowerGAN: a machine learning approach for power side-channel attack on compute-in-memory accelerators. arXiv preprint arXiv:2304.11056

  27. Wang K, Zheng H, Li Y, Li J and Louri A 2022 AGAPE: Anomaly detection with generative adversarial network for improved performance, energy, and security in manycore systems. In: 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 849–854

  28. Chhabria V. A, Kunal K, Zabihi M and Sapatnekar S S 2021 BeGAN: power grid benchmark generation using a process-portable GAN-based Methodology. In: 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pp. 1–8

  29. Zhou J, Cui G, Hu S, Zhang Z, Yang C, Liu Z, Wang L, Li C and Sun M 2020 Graph neural networks: a review of methods and applications. AI Open 1: 57–81

    Article  Google Scholar 

  30. Gao C, Zheng Y, Li N, Li Y, Qin Y, Piao J, Quan Y, Chang J, Jin D and He X et al. 2023 A survey of graph neural networks for recommender systems: challenges, methods, and directions. ACM Trans. Recomm. Syst. 1: 1–51

    Article  Google Scholar 

  31. Alrahis L, Patnaik S, Shafique M and Sinanoglu O 2022 Embracing graph neural networks for hardware security. In: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, pp. 1–9

  32. Chakraborty P, Cruz J and Bhunia S 2019 SURF: joint structural functional attack on logic locking. In: 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 181–190

  33. Sisejkovic D, Merchant F, Reimann L M, Srivastava H, Hallawa A and Leupers R 2020 Challenging the security of logic locking schemes in the era of deep learning: a neuroevolutionary approach. CoRR abs/2011.10389

  34. Rajendran J, Zhang H, Zhang C, Rose G S, Pino Y, Sinanoglu O and Karri R 2015 Fault analysis-based logic encryption. IEEE Trans. Comput. 64: 410–424

    Article  MathSciNet  Google Scholar 

  35. Yu S. Y, Yasaei R, Zhou Q, Nguyen T and Al Faruque M A 2021 HW2VEC: A graph learning tool for automating hardware security In: 2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 13–23

  36. Song Z, Yang X, Xu Z and King I 2022 Graph-based Semi-supervised learning: a comprehensive review. IEEE Trans. Neural Netw. Learn. Syst. 34: 8174–8194

    Article  MathSciNet  Google Scholar 

  37. Roweis S T and Saul L K 2000 Nonlinear dimensionality reduction by locally linear embedding. Science 290: 2323–2326

    Article  Google Scholar 

  38. Belkin M and Niyogi P 2001 Laplacian Eigenmaps and Spectral Techniques for Embedding and Clustering. Adv. Neural Inf. Process. Syst. p 14

  39. Ou M, Cui P, Pei J, Zhang Z and Zhu W 2016 Asymmetric transitivity preserving graph embedding. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1105–1114

  40. Perozzi B, Al-Rfou R, and Skiena S 2014 Deepwalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 701–710

  41. Yang Z, Cohen W and Salakhudinov R 2016 Revisiting Semi-supervised Learning with Graph Embeddings In: International Conference on Machine Learning, pp. 40–48

  42. Grover A and Leskovec J 2016 NODE2VEC: Scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 855–864

  43. Chen H, Perozzi B, Hu Y and Skiena S 2018 HARP: Hierarchical representation learning for networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 2127–2134

  44. Wang D, Cui P and Zhu W 2016 Structural deep network embedding In: Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1225–1234

  45. Kipf T N and Welling M 2016 Variational graph auto-encoders. arXiv preprint arXiv:1611.07308

  46. Pan S, Hu R, Fung S-f, Long G, Jiang J and Zhang C 2019 Learning graph embedding with adversarial training methods. IEEE Trans. Cybern. 50: 2475–2487

    Article  Google Scholar 

  47. Kipf T N and Welling M 2016 Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907

  48. Hamilton W. L, Ying R and Leskovec J 2017 Inductive representation learning on large graphs. CoRR abs/1706.02216

  49. Fan W, Liu C, Liu Y, Li J, Li H, Liu H, Tang J and Li Q 2023 Generative diffusion models on graphs: methods and applications. arXiv preprint arXiv:2302.02591

  50. Wang H, Wang J, Wang J, Zhao M, Zhang W, Zhang F, Xie X, and Guo M 2018 GraphGAN: graph representation learning with generative adversarial nets. In: Proceedings of the AAAI Conference on Artificial Intelligence

  51. Tang J, Qu M, Wang M, Zhang M, Yan J and Mei Q 2015 Line: large-scale information network embedding. In: Proceedings of the 24th International Conference on World Wide Web, pp. 1067–1077

  52. Subramanyan P, Ray S and Malik S 2015 Evaluating the security of logic encryption algorithms. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 137–143

  53. Azar K Z, Kamali H M, Homayoun H and Sasan A 2018 SMT Attack: next generation attack on obfuscated circuits with capabilities and performance beyond the SAT Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019: 97–122

    Article  Google Scholar 

  54. Alaql A, Rahman M M and Bhunia S 2021 SCOPE: synthesis-based constant propagation attack on logic locking. IEEE Trans. VLSI Syst. 29: 1529–1542

    Article  Google Scholar 

  55. Yang F, Tang M and Sinanoglu O 2019 Stripped functionality logic locking with hamming distance-based restore unit (SFLL-HD)—unlocked. IEEE Trans. Inf. Forensics Secur. 14: 2778–2786

    Article  Google Scholar 

  56. Xie Y and Srivastava A 2019 Anti-SAT: mitigating SAT attack on logic locking. IEEE Trans. Comput. Aided Des. Integr Circuits Syst. 38: 199–207

    Article  Google Scholar 

  57. Sisejkovic D, Merchant F, Reimann L. M and Leupers R 2021 Deceptive logic locking for hardware integrity protection against machine learning attacks. CoRR abs/2107.08695

  58. Alrahis L, Sengupta A, Knechtel J, Patnaik S, Saleh H, Mohammad B, Al-Qutayri M and Sinanoglu O 2021 GNN-RE: graph neural networks for reverse engineering of gate-level netlists. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41: 2435–2448

    Article  Google Scholar 

  59. He Z, Wang Z, Bail C, Yang H and Yu B 2021 Graph learning-based arithmetic block identification. In: 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pp. 1–8

  60. Chen Z, Kolhe G, Rafatirad S, Lu C.-T, PD S. M, Homayoun H and Zhao L 2020 Estimating the circuit De-obfuscation runtime based on graph deep learning. In: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 358–363

  61. Chen T, Sun Q, Zhan C, Liu C, Yu H and Yu B 2021 Deep H-GCN: fast analog IC aging-induced degradation estimation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41: 1990–2003

    Article  Google Scholar 

  62. Alrahis L, Knechtel J, Klemme F, Amrouch H and Sinanoglu O 2022 GNN4REL: graph neural networks for predicting circuit reliability degradation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41: 3826–3837

    Article  Google Scholar 

Download references

Acknowledgements

Jugal Gandhi acknowledges the fellowship support provided by CSIR-Human Resource Development Group (HRDG).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jai Gopal Pandey.

Appendix

Appendix

The GitHub repository will be regularly updated, ensuring the inclusion of the recent code, datasets, and relevant research materials. The project is actively managed with periodic updates to reflect ongoing work. The latest version is available at https://github.com/Sky025/GAN4IP.git.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gandhi, J., Shekhawat, D., Santosh, M. et al. GAN4IP: A unified GAN and logic locking-based pipeline for hardware IP security. Sādhanā 49, 169 (2024). https://doi.org/10.1007/s12046-024-02461-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12046-024-02461-8

Keywords

Navigation