2020
DOI: 10.1109/tc.2019.2953752
|View full text |Cite
|
Sign up to set email alerts
|

Graph Similarity and its Applications to Hardware Security

Abstract: Hardware reverse engineering is a powerful and universal tool for both security engineers and adversaries. From a defensive perspective, it allows for detection of intellectual property infringements and hardware Trojans, while it simultaneously can be used for product piracy and malicious circuit manipulations. From a designer's perspective, it is crucial to have an estimate of the costs associated with reverse engineering, yet little is known about this, especially when dealing with obfuscated hardware. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 31 publications
(23 citation statements)
references
References 32 publications
0
23
0
Order By: Relevance
“…In the field of computer security, graph similarity has also been studied for various application scenarios, such as the hardware security problem (Fyrbiak et al 2019), the malware indexing problem based on function-call graphs (Hu et al 2009), and the binary function similarity search for identifying vulnerable functions (Li et al 2019).…”
Section: Computer Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…In the field of computer security, graph similarity has also been studied for various application scenarios, such as the hardware security problem (Fyrbiak et al 2019), the malware indexing problem based on function-call graphs (Hu et al 2009), and the binary function similarity search for identifying vulnerable functions (Li et al 2019).…”
Section: Computer Securitymentioning
confidence: 99%
“…In Fyrbiak et al (2019), a graph similarity heuristic is proposed based on spectral analysis of adjacency matrices for the hardware security problem, where evaluations are done for three tasks, including gate-level netlist reverse engineering, Trojan detection, and obfuscation assessment. The proposed method outperforms the graph edit distance approximation algorithm proposed in Hu et al (2009) and the neighbor matching approach (Vujošević-Janičić et al 2013), which matches neighboring vertices based on graph topology.…”
Section: Computer Securitymentioning
confidence: 99%
“…Since netlists extracted from an IC may be incomplete and erroneous, looking for strict isomorphisms when matching with a library of subcircuits does not yield good results in practice. Instead, Fyrbiak et al [25] analyze the applicability of graph similarity algorithms. Their approach uses two phases: First, they detect register stages by leveraging control signals of sequential logic elements.…”
Section: Structural Analysismentioning
confidence: 99%
“…Graph pattern matching and graph similarity computation have been studied for many real applications, such as the binary function similarity search [22] and the hardware security [7]. In the past few decades, many graph matching metrics were defined, e.g., graph edit distance, graph isomorphism, etc.…”
Section: Graph Matching Approachesmentioning
confidence: 99%