A Hardware Trojan Detection Method Design Based on TensorFlow

被引:0
|
作者
Wu, Wenzhi [1 ,3 ]
Wei, Ying [2 ]
Ye, Ruizhe [1 ]
机构
[1] Network Information Center, Xiamen University of Technology, Xiamen, China
[2] Xiamen University Tan Kah Kee College, Xiamen, China
[3] Engineering Research Center for Software Testing and Evaluation of Fujian Province, Xiamen, China
关键词
Characteristic value - Circuit parameter - Detection technology - Experimental test - Functional changes - Hardware Trojan detection - Secret information - TensorFlow;
D O I
暂无
中图分类号
学科分类号
摘要
22
引用
收藏
页码:244 / 252
相关论文
共 50 条
  • [41] A novel hardware Trojan detection method based on sweep-frequency test
    He, Chunhua
    Lei, Dengyun
    Wu, Heng
    Cheng, Lianglun
    Huang, Qinwen
    Yan, Guizhen
    ELECTRONICS LETTERS, 2022, 58 (23) : 887 - 889
  • [42] Detection Method of Hardware Trojan Based on Wavelet Noise Reduction and Neural Network
    Li, Xiaopeng
    Xiao, Fei
    Li, Ling
    Shen, Jiangjiang
    Qian, Fengchen
    CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 256 - 265
  • [43] A PCA and Mahalanobis distance-based detection method for logical hardware Trojan
    Huang, Jiaoying
    Yang, Daming
    Gao, Cheng
    Fu, Chengcheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (12):
  • [44] A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework
    Yang, Xue
    Wei, Congming
    Ding, Yaoling
    Sun, Shaofei
    Wang, An
    Chen, Jiazhe
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2024, 14586 LNCS : 340 - 358
  • [45] A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework
    Yang, Xue
    Wei, Congming
    Ding, Yaoling
    Sun, Shaofei
    Wang, An
    Chen, Jiazhe
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT I, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14586 : 340 - 358
  • [46] MULTI ADAPTIVE HARDWARE TROJAN DETECTION METHOD BASED ON POWER CHACTERISTICS TEMPLATE
    Zhang, Lei
    Sun, Kewang
    Cui, Qi
    Wang, Sixiang
    Li, Xiaolin
    Di, Jianguo
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 414 - 418
  • [47] Hardware Trojan Detection Combines with Machine Learning: an Isolation Forest-based Detection Method
    Hu, Taifeng
    Wu, Liji
    Zhang, Xiangmin
    Liao, Zhaopo
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 96 - 103
  • [48] XG Boost Algorithm based Hardware Trojan Detection in Hardware Circuits
    Vennila, A.
    Balambigai, S.
    Arulmurugan, A.
    Hema, M.
    Kamali, M.
    Kishore, M.
    2023 5th International Conference on Electrical, Computer and Communication Technologies, ICECCT 2023, 2023,
  • [49] CRC-Based Hardware Trojan Detection for Improved Hardware Security
    Mohankumar, N.
    Jayakumar, M.
    Nirmala Devi, M.
    Lecture Notes in Electrical Engineering, 2018, 471 : 381 - 389
  • [50] New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time
    Salmani, Hassan
    Tehranipoor, Mohammad
    Plusquellic, Jim
    2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 66 - +