A survey on machine learning against hardware trojan attacks: Recent advances and challenges
Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …
inspired academic and industrial communities to explore its potential to address hardware …
Hardware trojans in chips: A survey for detection and prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Scalable activation of rare triggers in hardware trojans by repeated maximal clique sampling
Hardware Trojans are serious threat to security and reliability of computing systems. It is
hard to detect these malicious implants using traditional validation methods since an …
hard to detect these malicious implants using traditional validation methods since an …
A side-channel analysis for hardware Trojan detection based on path delay measurement
A Amelian, SE Borujeni - Journal of Circuits, Systems and …, 2018 - World Scientific
Hardware Trojan Horses (HTHs) are malicious modifications inserted in Integrated Circuit
during fabrication steps. The HTHs are very small and can cause damages in circuit …
during fabrication steps. The HTHs are very small and can cause damages in circuit …
Hardware Trojans Detection and Prevention Techniques Review
R Naveenkumar, NM Sivamangai - Wireless Personal Communications, 2024 - Springer
Technological developments in semiconductors have created previously unheard-of
chances for creativity, but they have also increased the danger of hardware Trojans, which …
chances for creativity, but they have also increased the danger of hardware Trojans, which …
Variation-aware hardware Trojan detection through power side-channel
A hardware Trojan (HT) denotes the malicious addition or modification of circuit elements.
The purpose of this work is to improve the HT detection sensitivity in ICs using power side …
The purpose of this work is to improve the HT detection sensitivity in ICs using power side …
Hardware trojan detection combine with machine learning: an svm-based detection approach
T Hu, L Wu, X Zhang, Y Yin… - 2019 IEEE 13th …, 2019 - ieeexplore.ieee.org
With the application of integrated circuits (ICs) appears in all aspects of life, whether an IC is
security and reliable has caused increasing worry which is of significant necessity. An …
security and reliable has caused increasing worry which is of significant necessity. An …
Hardware trojan detection leveraging a novel golden layout model towards practical applications
Globalization trend in integrated circuit design and manufacturing process has increased the
vulnerability of integrated circuit. These vulnerabilities mainly caused by hardware Trojan …
vulnerability of integrated circuit. These vulnerabilities mainly caused by hardware Trojan …
Hybrid multi‐level hardware Trojan detection platform for gate‐level netlists based on XGBoost
Y Zhang, S Li, X Chen, J Yao, Z Mao… - IET Computers & …, 2022 - Wiley Online Library
Co** with the problem of malicious third‐party vendors implanting Hardware Trojan (HT)
in the circuit design stage, this paper proposes a hybrid‐mode gate‐level hardware Trojan …
in the circuit design stage, this paper proposes a hybrid‐mode gate‐level hardware Trojan …
An exquisitely sensitive variant-conscious post-silicon Hardware Trojan detection
FS Hossain, T Yuneda - Integration, 2023 - Elsevier
Hardware Trojans, malicious modifications or additions to circuit elements, are often
introduced during outsourced stages of IC manufacturing. Their presence in hardware …
introduced during outsourced stages of IC manufacturing. Their presence in hardware …