{"title":"检测硬件描述语言中的漏洞:操作码语言处理","authors":"Alaaddin Goktug Ayar;Abdullah Sahruri;Sercan Aygun;Mehran Shoushtari Moghadam;M. Hassan Najafi;Martin Margala","doi":"10.1109/LES.2023.3334728","DOIUrl":null,"url":null,"abstract":"Detecting vulnerable code blocks has become a highly popular topic in computer-aided design, especially with the advancement of natural language processing (NLP). Analyzing hardware description languages (\n<monospace>HDLs</monospace>\n), such as Verilog, involves dealing with lengthy code. This letter introduces an innovative identification of attack-vulnerable hardware by the use of \n<monospace>opcode</monospace>\n processing. Leveraging the advantage of architecturally defined \n<monospace>opcodes</monospace>\n and expressing all operations at the beginning of each code line, the word processing problem is efficiently transformed into \n<monospace>opcode</monospace>\n processing. This research converts a benchmark dataset into an intermediary code stack, subsequently classifying secure and fragile codes using NLP techniques. The results reveal a framework that achieves up to 94% accuracy when employing sophisticated convolutional neural networks (CNNs) architecture with extra embedding layers. Thus, it provides a means for users to quickly verify the vulnerability of their \n<monospace>HDL</monospace>\n code by inspecting a supervised learning model trained on the predefined vulnerabilities. It also supports the superior efficacy of \n<monospace>opcode</monospace>\n-based processing in Trojan detection by analyzing the outcomes derived from a model trained using the \n<monospace>HDL</monospace>\n dataset.","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"16 2","pages":"222-226"},"PeriodicalIF":1.7000,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing\",\"authors\":\"Alaaddin Goktug Ayar;Abdullah Sahruri;Sercan Aygun;Mehran Shoushtari Moghadam;M. Hassan Najafi;Martin Margala\",\"doi\":\"10.1109/LES.2023.3334728\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Detecting vulnerable code blocks has become a highly popular topic in computer-aided design, especially with the advancement of natural language processing (NLP). Analyzing hardware description languages (\\n<monospace>HDLs</monospace>\\n), such as Verilog, involves dealing with lengthy code. This letter introduces an innovative identification of attack-vulnerable hardware by the use of \\n<monospace>opcode</monospace>\\n processing. Leveraging the advantage of architecturally defined \\n<monospace>opcodes</monospace>\\n and expressing all operations at the beginning of each code line, the word processing problem is efficiently transformed into \\n<monospace>opcode</monospace>\\n processing. This research converts a benchmark dataset into an intermediary code stack, subsequently classifying secure and fragile codes using NLP techniques. The results reveal a framework that achieves up to 94% accuracy when employing sophisticated convolutional neural networks (CNNs) architecture with extra embedding layers. Thus, it provides a means for users to quickly verify the vulnerability of their \\n<monospace>HDL</monospace>\\n code by inspecting a supervised learning model trained on the predefined vulnerabilities. It also supports the superior efficacy of \\n<monospace>opcode</monospace>\\n-based processing in Trojan detection by analyzing the outcomes derived from a model trained using the \\n<monospace>HDL</monospace>\\n dataset.\",\"PeriodicalId\":56143,\"journal\":{\"name\":\"IEEE Embedded Systems Letters\",\"volume\":\"16 2\",\"pages\":\"222-226\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2023-11-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Embedded Systems Letters\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10324337/\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Embedded Systems Letters","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10324337/","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing
Detecting vulnerable code blocks has become a highly popular topic in computer-aided design, especially with the advancement of natural language processing (NLP). Analyzing hardware description languages (
HDLs
), such as Verilog, involves dealing with lengthy code. This letter introduces an innovative identification of attack-vulnerable hardware by the use of
opcode
processing. Leveraging the advantage of architecturally defined
opcodes
and expressing all operations at the beginning of each code line, the word processing problem is efficiently transformed into
opcode
processing. This research converts a benchmark dataset into an intermediary code stack, subsequently classifying secure and fragile codes using NLP techniques. The results reveal a framework that achieves up to 94% accuracy when employing sophisticated convolutional neural networks (CNNs) architecture with extra embedding layers. Thus, it provides a means for users to quickly verify the vulnerability of their
HDL
code by inspecting a supervised learning model trained on the predefined vulnerabilities. It also supports the superior efficacy of
opcode
-based processing in Trojan detection by analyzing the outcomes derived from a model trained using the
HDL
dataset.
期刊介绍:
The IEEE Embedded Systems Letters (ESL), provides a forum for rapid dissemination of latest technical advances in embedded systems and related areas in embedded software. The emphasis is on models, methods, and tools that ensure secure, correct, efficient and robust design of embedded systems and their applications.