{"id":3648,"date":"2022-12-17T21:19:34","date_gmt":"2022-12-17T21:19:34","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3648"},"modified":"2022-12-18T16:55:10","modified_gmt":"2022-12-18T16:55:10","slug":"hw2vec-a-graph-learning-tool-for-automating-hardware-security","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/automation-of-hardware-security\/hw2vec-a-graph-learning-tool-for-automating-hardware-security\/","title":{"rendered":"HW2VEC: a Graph Learning Tool for Automating Hardware Security"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Tool Name<\/h2>\n\n\n\n<p>HW2VEC: a Graph Learning Tool for Automating Hardware Security<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>HW2VEC\u00a0is an open-source graph learning tool for hardware security applications.\u00a0HW2VEC\u00a0provides an automated pipeline to extract a graph representation (abstract syntax tree or data flow graph) from a hardware design in various abstraction levels (RTL or gate-level netlist).\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>More Info<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"\" target=\"_blank\" rel=\"noreferrer noopener\">Tool link<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Publications\/References<\/strong><\/h2>\n\n\n\n<p>S. -Y. Yu, R. Yasaei, Q. Zhou, T. Nguyen and M. A. Al Faruque, &#8220;HW2VEC: a Graph Learning Tool for Automating Hardware Security,&#8221;\u00a0<em>2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)<\/em>, 2021, pp. 13-23, doi: 10.1109\/HOST49136.2021.9702281. <a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/document\/9702281\" target=\"_blank\">https:\/\/ieeexplore.ieee.org\/document\/9702281<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contacts<\/strong><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Tool Name HW2VEC: a Graph Learning Tool for Automating Hardware Security Description HW2VEC\u00a0is an open-source graph learning tool for hardware security applications.\u00a0HW2VEC\u00a0provides an automated pipeline to extract a graph representation (abstract syntax tree or data flow graph) from a hardware design in various abstraction levels (RTL or gate-level netlist).\u00a0 More Info Publications\/References S. -Y. Yu, &hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":2344,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3648"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3648"}],"version-history":[{"count":9,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3648\/revisions"}],"predecessor-version":[{"id":3718,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3648\/revisions\/3718"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2344"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}