A Hardware Trojan Detection Method Design Based on TensorFlow

被引:0
|
作者
Wu, Wenzhi [1 ,3 ]
Wei, Ying [2 ]
Ye, Ruizhe [1 ]
机构
[1] Network Information Center, Xiamen University of Technology, Xiamen, China
[2] Xiamen University Tan Kah Kee College, Xiamen, China
[3] Engineering Research Center for Software Testing and Evaluation of Fujian Province, Xiamen, China
关键词
Characteristic value - Circuit parameter - Detection technology - Experimental test - Functional changes - Hardware Trojan detection - Secret information - TensorFlow;
D O I
暂无
中图分类号
学科分类号
摘要
22
引用
收藏
页码:244 / 252
相关论文
共 50 条
  • [21] Hardware trojan detection
    Case Western Reserve University, Cleveland, United States
    [J]. Introduction to Hardw. Secty. and Trust, (339-364):
  • [22] Hardware Trojan Detection Based on the Distance Discrimination
    Wang Jianxin
    Wang Boren
    Qu Ming
    Zhang Lei
    Xiao Chaoen
    [J]. 2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 404 - 407
  • [23] Novel design of Hardware Trojan: A generic approach for defeating testability based detection
    Zhang, Ning
    Lv, Zhiqiang
    Zhang, Yanlin
    Li, Haiyang
    Zhang, Yixin
    Huang, Weiqing
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 162 - 173
  • [24] Hardware Trojan Design and Detection in Asynchronous NCL Circuits
    Ponugoti, Kushal K.
    Srinivasan, Sudarshan K.
    Smith, Scott C.
    [J]. 2020 27TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2020,
  • [25] Design of Hardware Trojan Horse Based on Counter
    Liu, Huafeng
    Luo, Hongwei
    Wang, Liwei
    [J]. 2011 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2011, : 1007 - 1009
  • [26] Hardware Trojan Detection Based on Image Comparison
    Sun, Chen
    Guo, Xiaohui
    Li, Lingling
    Ma, Jingjing
    [J]. Lecture Notes on Data Engineering and Communications Technologies, 2022, 80 : 979 - 986
  • [27] Hardware Trojan Detection Based on Logical Testing
    Bazzazi, Amin
    Shalmani, Mohammad Taghi Manzuri
    Hemmatyar, Ali Mohammad Afshin
    [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (04): : 381 - 395
  • [28] Design of hardware trojan horse based on counter
    Liu, Huafeng
    Luo, Hongwei
    Wang, Liwei
    [J]. ICQR2MSE 2011 - Proceedings of 2011 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, 2011, : 1007 - 1009
  • [29] Hardware Trojan Detection Based on Signal Correlation
    Zhao, Wei
    Shen, Haihua
    Li, Huawei
    Li, Xiaowei
    [J]. 2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 80 - 85
  • [30] Hardware Trojan Detection Based on Logical Testing
    Amin Bazzazi
    Mohammad Taghi Manzuri Shalmani
    Ali Mohammad Afshin Hemmatyar
    [J]. Journal of Electronic Testing, 2017, 33 : 381 - 395