Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing
Alaaddin Goktug Ayar
1
,
Abdullah Sahruri
1
,
Sercan Aygun
1
,
Mehran Shoushtari Moghadam
1
,
M. Hassan Najafi
1
,
Martin Margala
1
1
School of Computing and Informatics, University of Louisiana at Lafayette, Lafayette, LA, USA
|
Publication type: Journal Article
Publication date: 2024-06-01
scimago Q2
wos Q3
SJR: 0.434
CiteScore: 3.4
Impact factor: 2.0
ISSN: 19430663, 19430671
Control and Systems Engineering
General Computer Science
Abstract
Detecting vulnerable code blocks has become a highly popular topic in computer-aided design, especially with the advancement of natural language processing (NLP). Analyzing Hardware Description Languages (HDL), such as Verilog, involves dealing with lengthy code. This study introduces an innovative identification of attack-vulnerable hardware by the use of opcode processing. Leveraging the advantage of architecturally-defined opcodes and expressing all operations at the beginning of each code line, the word processing problem is efficiently transformed into opcode processing. This research converts a benchmark dataset into an intermediary code stack, subsequently classifying secure and fragile codes using NLP techniques. The results reveal a framework that achieves up to 94% accuracy when employing sophisticated Convolutional Neural Networks (CNNs) architecture with extra embedding layers. Thus, it provides a means for users to quickly verify the vulnerability of their HDL code by inspecting a supervised learning model trained on the predefined vulnerabilities. It also supports the superior efficacy of opcode-based processing in Trojan detection by analyzing the outcomes derived from a model trained using the HDL dataset.
Found
Nothing found, try to update filter.
Found
Nothing found, try to update filter.
Top-30
Journals
|
1
|
|
|
IEEE Access
1 publication, 50%
|
|
|
1
|
Publishers
|
1
|
|
|
Institute of Electrical and Electronics Engineers (IEEE)
1 publication, 50%
|
|
|
Association for Computing Machinery (ACM)
1 publication, 50%
|
|
|
1
|
- We do not take into account publications without a DOI.
- Statistics recalculated weekly.
Are you a researcher?
Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
2
Total citations:
2
Citations from 2024:
2
(100%)
Cite this
GOST |
RIS |
BibTex |
MLA
Cite this
GOST
Copy
Ayar A. G. et al. Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing // IEEE Embedded Systems Letters. 2024. Vol. 16. No. 2. pp. 222-226.
GOST all authors (up to 50)
Copy
Ayar A. G., Sahruri A., Aygun S., Moghadam M. S., Najafi M. H., Margala M. Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing // IEEE Embedded Systems Letters. 2024. Vol. 16. No. 2. pp. 222-226.
Cite this
RIS
Copy
TY - JOUR
DO - 10.1109/les.2023.3334728
UR - https://ieeexplore.ieee.org/document/10324337/
TI - Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing
T2 - IEEE Embedded Systems Letters
AU - Ayar, Alaaddin Goktug
AU - Sahruri, Abdullah
AU - Aygun, Sercan
AU - Moghadam, Mehran Shoushtari
AU - Najafi, M. Hassan
AU - Margala, Martin
PY - 2024
DA - 2024/06/01
PB - Institute of Electrical and Electronics Engineers (IEEE)
SP - 222-226
IS - 2
VL - 16
SN - 1943-0663
SN - 1943-0671
ER -
Cite this
BibTex (up to 50 authors)
Copy
@article{2024_Ayar,
author = {Alaaddin Goktug Ayar and Abdullah Sahruri and Sercan Aygun and Mehran Shoushtari Moghadam and M. Hassan Najafi and Martin Margala},
title = {Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing},
journal = {IEEE Embedded Systems Letters},
year = {2024},
volume = {16},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
month = {jun},
url = {https://ieeexplore.ieee.org/document/10324337/},
number = {2},
pages = {222--226},
doi = {10.1109/les.2023.3334728}
}
Cite this
MLA
Copy
Ayar, Alaaddin Goktug, et al. “Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing.” IEEE Embedded Systems Letters, vol. 16, no. 2, Jun. 2024, pp. 222-226. https://ieeexplore.ieee.org/document/10324337/.