[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Vakil et al., 2021 - Google Patents

AVATAR: NN-assisted variation aware timing analysis and reporting for hardware trojan detection

Vakil et al., 2021

View PDF
Document ID
9670357292535567251
Author
Vakil A
Mirzaeian A
Homayoun H
Karimi N
Sasan A
Publication year
Publication venue
IEEE Access

External Links

Snippet

This paper presents AVATAR, a learning-assisted Trojan testing flow to detect hardware Trojans placed into fabricated ICs at an untrusted foundry, without needing a Golden IC. AVATAR is a side-channel delay-based testing solution that is assisted by a learning model …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • G06F17/504Formal methods
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3183Generation of test inputs, e.g. test vectors, patterns or sequence
    • G01R31/318385Random or pseudo-random test pattern
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3185Reconfiguring for testing, e.g. LSSD, partitioning
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass

Similar Documents

Publication Publication Date Title
Huang et al. A survey on machine learning against hardware trojan attacks: Recent advances and challenges
Salmani COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist
Liakos et al. Conventional and machine learning approaches as countermeasures against hardware trojan attacks
Vakil et al. AVATAR: NN-assisted variation aware timing analysis and reporting for hardware trojan detection
Yang et al. Survey: Hardware trojan detection for netlist
Wei et al. Provably complete hardware trojan detection using test point insertion
Vakil et al. Lasca: Learning assisted side channel delay analysis for hardware trojan detection
Gubbi et al. Hardware trojan detection using machine learning: A tutorial
Pan et al. A survey on hardware vulnerability analysis using machine learning
Surabhi et al. Hardware trojan detection using controlled circuit aging
Kitsos et al. Towards a hardware Trojan detection methodology
Rajendran et al. A novel algorithm for hardware trojan detection through reverse engineering
Hassan et al. Circuit topology-aware vaccination-based hardware trojan detection
Mukherjee et al. A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention
Priyatharishini et al. A deep learning based malicious module identification using stacked sparse autoencoder network for VLSI circuit reliability
Kampel et al. Locating hardware trojans using combinatorial testing for cryptographic circuits
Leveugle Early analysis of fault-based attack effects in secure circuits
Meng et al. Can overclocking detect hardware Trojans?
Rajendran et al. Sok: Physical and logic testing techniques for hardware trojan detection
Yust et al. Structural checking: Detecting malicious logic without a golden reference
Jacob et al. Detection of malicious circuitry using transition probability based node reduction technique
Danger et al. LAOCOÖN: A run-time monitoring and verification approach for hardware trojan detection
Vakil Golden-Chip Free Side Channel Delay Analysis Test for Hardware Trojan and Recycled IC Detection
Sruthi et al. Genetic algorithm based hardware trojan detection
Saravanan et al. A novel approach to detect hardware malware using hamming weight model and one class support vector machine