TY - GEN
T1 - Attacking a CNN-based Layout Hotspot Detector Using Group Gradient Method
AU - Yang, Haoyu
AU - Zhang, Shifan
AU - Liu, Kang
AU - Liu, Siting
AU - Tan, Benjamin
AU - Karri, Ramesh
AU - Garg, Siddharth
AU - Yu, Bei
AU - Young, Evangeline F.Y.
N1 - Publisher Copyright:
© 2021 Association for Computing Machinery.
PY - 2021/1/18
Y1 - 2021/1/18
N2 - Deep neural networks are being used in disparate VLSI design automation tasks, including layout printability estimation, mask optimization, and routing congestion analysis. Preliminary results show the power of deep learning as an alternate solution in state-of-theart design and sign-off flows. However, deep learning is vulnerable to adversarial attacks. In this paper, we examine the risk of state-ofthe- art deep learning-based layout hotspot detectors under practical attack scenarios. We show that legacy gradient-based attacks do not adequately consider the design rule constraints. We present an innovative adversarial attack formulation to attack the layout clips and propose a fast group gradient method to solve it. Experiments show that the attack can deceive the deep neural networks using small perturbations in clips which preserve layout functionality while meeting the design rules. The source code is available at https://github.com/phdyang007/dlhsd/tree/dct_as_conv.
AB - Deep neural networks are being used in disparate VLSI design automation tasks, including layout printability estimation, mask optimization, and routing congestion analysis. Preliminary results show the power of deep learning as an alternate solution in state-of-theart design and sign-off flows. However, deep learning is vulnerable to adversarial attacks. In this paper, we examine the risk of state-ofthe- art deep learning-based layout hotspot detectors under practical attack scenarios. We show that legacy gradient-based attacks do not adequately consider the design rule constraints. We present an innovative adversarial attack formulation to attack the layout clips and propose a fast group gradient method to solve it. Experiments show that the attack can deceive the deep neural networks using small perturbations in clips which preserve layout functionality while meeting the design rules. The source code is available at https://github.com/phdyang007/dlhsd/tree/dct_as_conv.
UR - http://www.scopus.com/inward/record.url?scp=85100597118&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85100597118&partnerID=8YFLogxK
U2 - 10.1145/3394885.3431571
DO - 10.1145/3394885.3431571
M3 - Conference contribution
AN - SCOPUS:85100597118
T3 - Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC
SP - 885
EP - 891
BT - Proceedings of the 26th Asia and South Pacific Design Automation Conference, ASP-DAC 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 26th Asia and South Pacific Design Automation Conference, ASP-DAC 2021
Y2 - 18 January 2021 through 21 January 2021
ER -