[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Faezi et al., 2021 - Google Patents

Htnet: Transfer learning for golden chip-free hardware trojan detection

Faezi et al., 2021

View PDF
Document ID
5984919166742021392
Author
Faezi S
Yasaei R
Al Faruque M
Publication year
Publication venue
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)

External Links

Snippet

Design and fabrication outsourcing has made integrated circuits (IC) vulnerable to malicious modifications by third parties known as hardware Trojans (HT). Over the last decade, the use of side-channel measurements for detecting the malicious manipulation of the ICs has been …
Continue reading at past.date-conference.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass

Similar Documents

Publication Publication Date Title
Faezi et al. Htnet: Transfer learning for golden chip-free hardware trojan detection
Huang et al. A survey on machine learning against hardware trojan attacks: Recent advances and challenges
Liu et al. Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting
Huang et al. MERS: statistical test generation for side-channel analysis based Trojan detection
Cakır et al. Hardware Trojan detection for gate-level ICs using signal correlation based clustering
Faezi et al. Brain-inspired golden chip free hardware trojan detection
Utyamishev et al. Real-time detection of power analysis attacks by machine learning of power supply variations on-chip
Muralidhar et al. Contrastive graph convolutional networks for hardware Trojan detection in third party IP cores
Vakil et al. Lasca: Learning assisted side channel delay analysis for hardware trojan detection
Kundu et al. Application of machine learning in hardware trojan detection
Tebyanian et al. SC-COTD: Hardware trojan detection based on sequential/combinational testability features using ensemble classifier
Al-Abassi et al. A self-tuning cyber-attacks’ location identification approach for critical infrastructures
Kutzner et al. Hardware trojan design and detection: a practical evaluation
Kitsos et al. Towards a hardware Trojan detection methodology
Aramoon et al. Impacts of machine learning on counterfeit IC detection and avoidance techniques
Wei et al. Gate characterization using singular value decomposition: Foundations and applications
Vakil et al. AVATAR: NN-assisted variation aware timing analysis and reporting for hardware trojan detection
Mukherjee et al. A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention
Priyatharishini et al. A deep learning based malicious module identification using stacked sparse autoencoder network for VLSI circuit reliability
Kurihara et al. Hardware-Trojan Detection Based on the Structural Features of Trojan Circuits Using Random Forests
Sharma et al. A review: machine learning based hardware trojan detection
Karimi et al. On the effect of aging in detecting hardware trojan horses with template analysis
Meenakshi Performance enhancement of unsupervised hardware trojan detection algorithm using clustering-based local outlier factor technique for design security
Kwan Malware detection at the microarchitecture level using machine learning techniques
Hu et al. Hardware Trojan detection combines with Machine Learning: an Isolation Forest-based detection method