Faezi et al., 2021 - Google Patents
Htnet: Transfer learning for golden chip-free hardware trojan detectionFaezi et al., 2021
View PDF- Document ID
- 5984919166742021392
- Author
- Faezi S
- Yasaei R
- Al Faruque M
- Publication year
- Publication venue
- 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)
External Links
Snippet
Design and fabrication outsourcing has made integrated circuits (IC) vulnerable to malicious modifications by third parties known as hardware Trojans (HT). Over the last decade, the use of side-channel measurements for detecting the malicious manipulation of the ICs has been …
- 238000001514 detection method 0 title abstract description 51
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Faezi et al. | Htnet: Transfer learning for golden chip-free hardware trojan detection | |
Huang et al. | A survey on machine learning against hardware trojan attacks: Recent advances and challenges | |
Liu et al. | Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting | |
Huang et al. | MERS: statistical test generation for side-channel analysis based Trojan detection | |
Cakır et al. | Hardware Trojan detection for gate-level ICs using signal correlation based clustering | |
Faezi et al. | Brain-inspired golden chip free hardware trojan detection | |
Utyamishev et al. | Real-time detection of power analysis attacks by machine learning of power supply variations on-chip | |
Muralidhar et al. | Contrastive graph convolutional networks for hardware Trojan detection in third party IP cores | |
Vakil et al. | Lasca: Learning assisted side channel delay analysis for hardware trojan detection | |
Kundu et al. | Application of machine learning in hardware trojan detection | |
Tebyanian et al. | SC-COTD: Hardware trojan detection based on sequential/combinational testability features using ensemble classifier | |
Al-Abassi et al. | A self-tuning cyber-attacks’ location identification approach for critical infrastructures | |
Kutzner et al. | Hardware trojan design and detection: a practical evaluation | |
Kitsos et al. | Towards a hardware Trojan detection methodology | |
Aramoon et al. | Impacts of machine learning on counterfeit IC detection and avoidance techniques | |
Wei et al. | Gate characterization using singular value decomposition: Foundations and applications | |
Vakil et al. | AVATAR: NN-assisted variation aware timing analysis and reporting for hardware trojan detection | |
Mukherjee et al. | A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention | |
Priyatharishini et al. | A deep learning based malicious module identification using stacked sparse autoencoder network for VLSI circuit reliability | |
Kurihara et al. | Hardware-Trojan Detection Based on the Structural Features of Trojan Circuits Using Random Forests | |
Sharma et al. | A review: machine learning based hardware trojan detection | |
Karimi et al. | On the effect of aging in detecting hardware trojan horses with template analysis | |
Meenakshi | Performance enhancement of unsupervised hardware trojan detection algorithm using clustering-based local outlier factor technique for design security | |
Kwan | Malware detection at the microarchitecture level using machine learning techniques | |
Hu et al. | Hardware Trojan detection combines with Machine Learning: an Isolation Forest-based detection method |