Htnet: Transfer learning for golden chip-free hardware trojan detection

S Faezi, R Yasaei… - 2021 Design, Automation & …, 2021 - ieeexplore.ieee.org
Design and fabrication outsourcing has made integrated circuits (IC) vulnerable to malicious
modifications by third parties known as hardware Trojans (HT). Over the last decade, the use …

Attack detection based on machine learning techniques to safe and secure for CPS—A review

DM Sharma, SK Shandilya - … Conference on IoT, Intelligent Computing and …, 2023 - Springer
Technological progression in communication and computing domains has led to the advent
of cyber-physical systems (CPS). As an emerging technological advancement, CPS security …

A Side-Channel Hardware Trojan Detection Method Based on Fuzzy C-Means Clustering and Fusion Distance Algorithms

C He, D Lei, H Wu, L Cheng, G Yan… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the wide application of the Internet of Things technology, the hardware security has
attracted more and more attention from users around the world. Hardware Trojan (HT) of …

A novel hardware Trojan detection method based on sweep‐frequency test

C He, D Lei, H Wu, L Cheng, Q Huang… - Electronics Letters, 2022 - Wiley Online Library
This paper proposes a novel hardware Trojan detection method based on sweep‐frequency
test since Trojan horse threatens information security seriously. An equivalent parasitic and …

A node reduction technique for trojan detection and diagnosis in IoT hardware devices

SR Rajendran, N Devi, M Jayakumar - Internet of Things, 2022 - taylorfrancis.com
Secured hardware is necessary to upgrade the performance, reliability and efficiency of any
Internet of Things (IoT) system. Hardware security directly ensures the integrated circuit (IC) …

Gen-Power: Anomaly Detection in IoT Devices Utilizing Generated Power Waveforms

K Hisafuru, N Togawa - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
Recently, IoT (Internet-of-Things) devices are very widely used in consumer electronics
areas and their design and manufacturing are often outsourced to third parties to make them …

Low-Quality Integrated Circuits Image Verification Based on Low-Rank Subspace Clustering with High-Frequency Texture Components

G Tan, Z Liang, Y Chi, Q Li, B Peng, Y Liu, J Li - Applied Sciences, 2022 - mdpi.com
With the vigorous development of integrated circuit (IC) manufacturing, the harmfulness of
defects and hardware Trojans is also rising. Therefore, chip verification becomes more and …

Hardware trojan detection in ISCAS-89 circuits using supervised machine learning algorithms

JP Ketan, AA Shetty - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
Hardware Trojans pose a substantial risk to integrated circuits (ICs). It is critical to discover
these unauthorised alterations within the first stages of manufacture, if not before mass …

[图书][B] Golden Chip-Free Hardware Trojan Detection Through Side-Channel Analysis Using Machine Learning

R Yasaei - 2021 - search.proquest.com
Abstract Design and fabrication outsourcing has made integrated circuits vulnerable to
malicious modifications by third parties known as hardware Trojan (HT). Over the last …

Ensured Configuration Security of FPGAs against CAD Attacks

DA John, M Nirmala Devi - … Conference on Advances in Electrical and …, 2021 - Springer
The security concern of design implementation on field programmable gate arrays (FPGA) is
increasing day by day as the FPGAs are the dependable platform for many applications. The …