A survey on machine learning against hardware trojan attacks: Recent advances and challenges
Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …
inspired academic and industrial communities to explore its potential to address hardware …
Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective
G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …
devices act in concert, rarely requiring human intervention, posing significant challenges in …
Brain-inspired golden chip free hardware trojan detection
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has
been extensively studied. However, the majority of works either rely on a golden chip, or …
been extensively studied. However, the majority of works either rely on a golden chip, or …
Conventional and machine learning approaches as countermeasures against hardware trojan attacks
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …
increasing at a steady pace. This rapid development drives the technology companies to …
Machine learning for hardware trojan detection: A review
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …
increasing at a steady pace. This rapid development drives the technology companies to …
Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models
Globalization trends in integrated circuit (IC) design are leading to increased vulnerability of
ICs against hardware Trojans (HT). Recently, several side channel parameters based …
ICs against hardware Trojans (HT). Recently, several side channel parameters based …
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …
systems. A deployed electronic system with one or more undetected Hardware Trojan …
Fusion-on-field security and privacy preservation for IoT edge devices: Concurrent defense against multiple types of hardware trojan attacks
Internet of Things (IoT) devices have connected millions of houses around the globe via the
internet. In the recent past, threats due to hardware Trojan (HT) in the integrated circuits (IC) …
internet. In the recent past, threats due to hardware Trojan (HT) in the integrated circuits (IC) …
Detecting RTL trojans using artificial immune systems and high level behavior classification
Security assurance in a computer system can be viewed as distinguishing between self and
non-self. Artificial Immune Systems (AIS) are a class of machine learning (ML) techniques …
non-self. Artificial Immune Systems (AIS) are a class of machine learning (ML) techniques …
MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices
Traditional learning-based approaches for runtime hardware Trojan (HT) detection require
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …