Moghaddas et al., 2021 - Google Patents
Technical Report for HW2VEC--A Graph Learning Tool for Automating Hardware SecurityMoghaddas et al., 2021
View PDF- Document ID
- 11496155096803349063
- Author
- Moghaddas Y
- Nguyen T
- Yu S
- Yasaei R
- Faruque M
- Publication year
- Publication venue
- arXiv preprint arXiv:2108.00078
External Links
Snippet
In this technical report, we present HW2VEC [11], an open-source graph learning tool for hardware security, and its implementation details (Figure 1). HW2VEC provides toolboxes for graph representation extraction in the form of Data Flow Graphs (DFGs) or Abstract …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
- G06F17/504—Formal methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5045—Circuit design
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5068—Physical circuit design, e.g. layout for integrated circuits or printed circuit boards
- G06F17/5081—Layout analysis, e.g. layout verification, design rule check
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2705—Parsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/41—Compilation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109426722B (en) | SQL injection defect detection method, system, equipment and storage medium | |
Yasaei et al. | Gnn4tj: Graph neural networks for hardware trojan detection at register transfer level | |
Shen et al. | A survey of automatic software vulnerability detection, program repair, and defect prediction techniques | |
Yu et al. | HW2VEC: A graph learning tool for automating hardware security | |
Zeng et al. | Fast code clone detection based on weighted recursive autoencoders | |
Jeon et al. | AutoVAS: An automated vulnerability analysis system with a deep learning approach | |
Yasaei et al. | Hardware trojan detection using graph neural networks | |
CN111475820B (en) | Binary vulnerability detection method, system and storage medium based on executable program | |
US6990438B1 (en) | Method and apparatus for observability-based code coverage | |
Slivovsky | Interpolation-based semantic gate extraction and its applications to QBF preprocessing | |
Li et al. | Open source software security vulnerability detection based on dynamic behavior features | |
Ji et al. | Vestige: Identifying binary code provenance for vulnerability detection | |
Wang et al. | Learning from the past: Efficient high-level synthesis design space exploration for fpgas | |
Wang et al. | BugPre: an intelligent software version-to-version bug prediction system using graph convolutional neural networks | |
Xue et al. | SEED: Semantic graph based deep detection for type-4 clone | |
Fendri et al. | A deep-learning approach to side-channel based CPU disassembly at design time | |
Moghaddas et al. | Technical Report for HW2VEC--A Graph Learning Tool for Automating Hardware Security | |
Yuan et al. | Software vulnerable functions discovery based on code composite feature | |
Singer et al. | Syclops: A sycl specific llvm to mlir converter | |
Utyamishev et al. | Knowledge graph embedding and visualization for pre-silicon detection of hardware Trojans | |
Barbareschi et al. | Design Space Exploration Tools | |
Wang et al. | [Retracted] Hierarchical Attention Graph Embedding Networks for Binary Code Similarity against Compilation Diversity | |
Paulheim et al. | From Word Embeddings to Knowledge Graph Embeddings | |
Coward et al. | ROVER: RTL Optimization via Verified E-Graph Rewriting | |
Chattopadhyay et al. | Deep learning based graph neural network technique for hardware trojan detection at register transfer level |