Mathematical Foundations of AI-Based Secure Physical Design Verification
Main Article Content
Abstract
Concerns about hardware security are raised by the increasing dependence on third-party Semiconductor Intellectual Property in system-on-chip design, especially during physical design verification. Traditional rule-based verification methods, such as Design Rule Checking (DRC) and Layout vs. Schematic (LVS) checking, together with side-channel analysis indicated apparent deficiencies in dealing with new forms of threat. The impossibility of distinguishing dependable from malicious insertions in ICs makes it hard to prevent such dangers as hardware Trojans (HTs); side-channel vulnerabilities remain everywhere, and modifications at various stages of the manufacturing process can be hard to detect. This thesis addresses these security challenges by defining a theoretical AI-driven framework for secure physical design verification that couples graph neural network models (GNNs) and probabilistic modeling with constraints optimized to maximize IC security. This approach views physical design verification as graph-based machine learning: GNNs identify unauthorized modifications or discrepancies between the layout and circuit netlist through the acquisition of behavioral metrics and structural feature extraction of netlist data. A probabilistic DRC model is derived after processing some learning data using recurrent algorithms. This model departs from the rigid rules of traditional deterministic DRC in that it uses machine learning-based predictions to estimate the likelihood that design rules will be violated. Also, we can model mathematical foundations for the secure routing as a constrained pathfinding problem for all myths addressed above concerning these different methods—moves are optimized to avoid sources of security problems. These problems might include crosstalk-induced leakage and electromagnetic sidechannel threats. Lagrange multipliers and Karush-Kuhn-Tucker (KKT) conditions are included in verification to maintain security constraints while ensuring efficient use of resources. Then, HT detection is reformulated as GNN-based node embeddings, whose information propagation throughout the circuit graph picks up modifications at boundary nodes and those less deep in the structure. As an alternative to experience-based anomaly detection proposed in earlier work, a theoretical softmaxbased anomaly classification framework is put forward here to model HT insertion probabilities, gathering acceptable anomalies at various levels of circuit design from RTL-level to Gate-level as necessary. The capturing of side-channel signals becomes the focus of a deep learning-based theoretical run-time anomaly detection model, aiming at power and electromagnetic (EM) leakage patterns so that all potential threats can be detected early on. This theoretical framework provides a conceptual methodology for scalable, automated, and robust security verification in modern ICs through graph-based learning, and constrained optimization methods. It lays a foundation to advance secure semiconductor designs further using AI-driven techniques without recourse to benchmarks or empirical validations.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
Faezi, S., Yasaei, R., & Al Faruque, M. A. (2021). HTnet: Transfer learning for golden chip-free hardware Trojan detection. University of California, Irvine. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 41(4), 9474076. DOI: https://doi.org/10.1109/TCAD.2021.3086686
Yasaei, R., Yu, S.-Y., & Al Faruque, M. A. (2021). GNN4TJ: Graph neural networks for hardware Trojan detection at register transfer level. In Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE). DOI: https://doi.org/10.23919/DATE51398.2021.9474174
Hasegawa, K., Yanagisawa, M., & Togawa, N. (2017). Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS). IEEE. DOI: https://doi.org/10.1109/ISCAS.2017.8050827
Lashen, H., Alrahis, L., Knechtel, J., & Sinanoglu, O. (2023). TrojanSAINT: Gate-Level Netlist Sampling-Based Inductive Learning for Hardware Trojan Detection. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS). IEEE. DOI: https://doi.org/10.48550/arXiv.2301.11804
Dey, S., Park, J., Pundir, N., Saha, D., Shuvo, A. M., Mehta, D., Asadi, N., Rahman, F., Farahmandi, F., & Tehranipoor, M. (2022). Secure Physical Design. Cryptology ePrint Archive, Paper 2022/891. Retrieved from https://eprint.iacr.org/2022/891; DOI: http://doi.org/10.1007/978-3-031-58687-3_9.
Yasaei, R., Chen, L., Yu, S.-Y., & Al Faruque, M. A. (2022). Hardware Trojan Detection using Graph Neural Networks. arXiv preprint arXiv:2204.11431. DOI: https://doi.org/10.48550/arXiv.2204.11431
Kiruthika, R., Saranraj, N., Chandru, K., Geethapriya, N., Kiruthika, S. V., & Raja, S. (2023). Exploring the Frontiers: Innovations in Semiconductor Technology and AI-Driven SoC Design. SSRN Electronic Journal. DOI: https://doi.org/10.2139/ssrn.5086781
Alrahis, L., Patnaik, S., Hanif, M. A., Shafique, M., & Sinanoglu, O. (2021). UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE. DOI: https://doi.org/10.1109/ICCAD51958.2021.9643476
Alrahis, L., Knechtel, J., Klemme, F., Amrouch, H., & Sinanoglu, O. GNN4REL: Graph Neural Networks for Predicting Circuit Reliability Degradation. DOI: https://doi.org/10.48550/arXiv.2208.02868
Parikh, R., & Parikh, K. (2025). Survey on Hardware Security: PUFs, Trojans, and Side-Channel Attacks. Preprints.org. DOI: https://doi.org/10.20944/preprints202501.1559.v1
Yasaei, R., Faezi, S., & Al Faruque, M. A. (2022). Golden Reference-Free Hardware Trojan Localization Using Graph Convolutional Network. In Proceedings of the 2022 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE. DOI: https://doi.org/10.1109/TVLSI.2022.3191683
Alrahis, L., Sengupta, A., Knechtel, J., Patnaik, S., Saleh, H., Mohammad, B., Al-Qutayri, M., & Sinanoglu, O. (2021). GNN-RE: Graph Neural Networks for Reverse Engineering of Gate-Level Netlists. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 41(8), 2435-2448. DOI: https://doi.org/10.1109/TCAD.2021.3110807
Yao, F., Fang, H., Doroslovački, M., & Venkataramani, G. (2019). COTSknight: Practical Defense against Cache Timing Channel Attacks using Cache Monitoring and Partitioning Technologies. In Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE. DOI: https://doi.org/10.1109/HST.2019.8740835
Hasegawa, K., Hidano, S., Nozawa, K., Kiyomoto, S., & Togawa, N. (2022). R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training. arXiv preprint arXiv:2205.13702. DOI: https://doi.org/10.48550/arXiv.2205.13702
Klambauer, G., Unterthiner, T., Mayr, A., & Hochreiter, S. (2017). Self-Normalizing Neural Networks. In Advances in Neural Information Processing Systems 30 (NIPS 2017) (pp. 972–981). DOI: https://doi.org/10.48550/arXiv.1706.02515
He, J., Liu, Y., Yuan, Y., Hu, K., Xia, X., & Zhao, Y. (2020). Golden Chip-Free Trojan Detection Leveraging Trojan Trigger's Side-Channel Fingerprinting. ACM Transactions on Embedded Computing Systems, 19(5), Article 41. DOI: https://doi.org/10.1145/3419105
Parikh, R., & Parikh, K. (2025). Survey on Hardware Security: PUFs, Trojans, and Side-Channel Attacks. International Journal of Engineering Research and Applications, 15(2), 30-37. DOI: http://dx.doi.org/10.20944/preprints202501.1559.v1
Naik, V., Sahoo, R., Mahajan, S., Singh, S., & Malik, S. (2021). E xploration E xploitation Problem in Policy Based Deep Reinforcement Learning for Episodic and Continuous Environments. In International Journal of Engineering and Advanced Technology (Vol. 11, Issue 2, pp. 29–34). DOI: https://doi.org/10.35940/ijeat.b3267.1211221
T. Manjunath Kumar, R. Murugeswari, Deep Reinforcement Learning Based on Link Prediction Method in Social Network Analysis. (2019). In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 2S2, pp. 820–826). DOI: https://doi.org/10.35940/ijitee.b1127.1292s219
Vidhya, T., & Chandrasekar, Dr. C. (2024). Gibbs Haversine Reinforcement Learning Based Handover For 5g Enabled Seamless Mobility in Wireless Network. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 12, Issue 6, pp. 43–54). DOI: https://doi.org/10.35940/ijrte.f8018.12060324