volume 16 issue 2 pages 222-226

Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing

Alaaddin Goktug Ayar 1
Abdullah Sahruri 1
Sercan Aygun 1
Mehran Shoushtari Moghadam 1
M. Hassan Najafi 1
Martin Margala 1
1
 
School of Computing and Informatics, University of Louisiana at Lafayette, Lafayette, LA, USA
Publication typeJournal Article
Publication date2024-06-01
scimago Q2
wos Q3
SJR0.434
CiteScore3.4
Impact factor2.0
ISSN19430663, 19430671
Control and Systems Engineering
General Computer Science
Abstract
Detecting vulnerable code blocks has become a highly popular topic in computer-aided design, especially with the advancement of natural language processing (NLP). Analyzing Hardware Description Languages (HDL), such as Verilog, involves dealing with lengthy code. This study introduces an innovative identification of attack-vulnerable hardware by the use of opcode processing. Leveraging the advantage of architecturally-defined opcodes and expressing all operations at the beginning of each code line, the word processing problem is efficiently transformed into opcode processing. This research converts a benchmark dataset into an intermediary code stack, subsequently classifying secure and fragile codes using NLP techniques. The results reveal a framework that achieves up to 94% accuracy when employing sophisticated Convolutional Neural Networks (CNNs) architecture with extra embedding layers. Thus, it provides a means for users to quickly verify the vulnerability of their HDL code by inspecting a supervised learning model trained on the predefined vulnerabilities. It also supports the superior efficacy of opcode-based processing in Trojan detection by analyzing the outcomes derived from a model trained using the HDL dataset.
Found 
Found 

Top-30

Journals

1
IEEE Access
1 publication, 50%
1

Publishers

1
Institute of Electrical and Electronics Engineers (IEEE)
1 publication, 50%
Association for Computing Machinery (ACM)
1 publication, 50%
1
  • We do not take into account publications without a DOI.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
2
Share
Cite this
GOST |
Cite this
GOST Copy
Ayar A. G. et al. Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing // IEEE Embedded Systems Letters. 2024. Vol. 16. No. 2. pp. 222-226.
GOST all authors (up to 50) Copy
Ayar A. G., Sahruri A., Aygun S., Moghadam M. S., Najafi M. H., Margala M. Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing // IEEE Embedded Systems Letters. 2024. Vol. 16. No. 2. pp. 222-226.
RIS |
Cite this
RIS Copy
TY - JOUR
DO - 10.1109/les.2023.3334728
UR - https://ieeexplore.ieee.org/document/10324337/
TI - Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing
T2 - IEEE Embedded Systems Letters
AU - Ayar, Alaaddin Goktug
AU - Sahruri, Abdullah
AU - Aygun, Sercan
AU - Moghadam, Mehran Shoushtari
AU - Najafi, M. Hassan
AU - Margala, Martin
PY - 2024
DA - 2024/06/01
PB - Institute of Electrical and Electronics Engineers (IEEE)
SP - 222-226
IS - 2
VL - 16
SN - 1943-0663
SN - 1943-0671
ER -
BibTex |
Cite this
BibTex (up to 50 authors) Copy
@article{2024_Ayar,
author = {Alaaddin Goktug Ayar and Abdullah Sahruri and Sercan Aygun and Mehran Shoushtari Moghadam and M. Hassan Najafi and Martin Margala},
title = {Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing},
journal = {IEEE Embedded Systems Letters},
year = {2024},
volume = {16},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
month = {jun},
url = {https://ieeexplore.ieee.org/document/10324337/},
number = {2},
pages = {222--226},
doi = {10.1109/les.2023.3334728}
}
MLA
Cite this
MLA Copy
Ayar, Alaaddin Goktug, et al. “Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing.” IEEE Embedded Systems Letters, vol. 16, no. 2, Jun. 2024, pp. 222-226. https://ieeexplore.ieee.org/document/10324337/.