Reliability Enhancement of Hardware Trojan Detection using Histogram Augmentation Technique

被引:0
|
作者
Sankar, Vaishnavi [1 ]
Balachander, S. [1 ]
Devi, M. Nirmala [1 ]
Jayakumar, M. [1 ]
机构
[1] Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Department of Electronics and Communication Engineering, Coimbatore, India
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
36th International Conference on VLSI Design, VLSID 2023
中图分类号
学科分类号
摘要
Feature extraction - Graphic methods - Hardware security - Integrated circuits - Malware - Supply chains
引用
收藏
页码:365 / 370
相关论文
共 50 条
  • [41] Detection and analysis of hardware trojan using scan chain method
    Rithesh, M.
    Ram, Bhargav B., V
    Harish, G.
    Yellampalli, Siva
    2015 19TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2015,
  • [42] A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis
    Bian, Rongzhen
    Xue, Mingfu
    Wang, Jian
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 634 - 646
  • [43] Detection of Hardware Trojan Horse using Unsupervised Learning Approach
    Samyukta, K.
    Ramesh, S.R.
    2023 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2023, 2023, : 77 - 82
  • [44] Adversarial Attack Resilient ML-Assisted Hardware Trojan Detection Technique
    Alkurdi, Mohammed
    Ghimire, Ashutosh
    Amsaad, Fathi
    2024 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, ISVLSI, 2024, : 313 - 318
  • [45] SEMBA: a SEM Based Acquisition technique for fast invasive Hardware Trojan detection
    Courbon, Franck
    Loubet-Moundi, Philippe
    Fournier, Jacques J. A.
    Tria, Assia
    2015 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN (ECCTD), 2015, : 141 - 144
  • [46] Adversarial Attack Resilient ML-Assisted Hardware Trojan Detection Technique
    Alkurdi, Mohammed
    Ghimire, Ashutosh
    Amsaad, Fathi
    Proceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI, 2024, : 313 - 318
  • [47] A Hardware Trojan-Detection Technique Based on Suspicious Circuit Block Partition
    Mao, Jiajie
    Jiang, Xiaowen
    Liu, Dehong
    Chen, Jianjun
    Huang, Kai
    ELECTRONICS, 2022, 11 (24)
  • [48] The Improved COTD Technique for Hardware Trojan Detection in Gate-level Netlist
    Salmani, Hassan
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 449 - 454
  • [49] A high efficiency Hardware Trojan detection technique based on fast SEM imaging
    Courbon, Franck
    Loubet-Moundi, Philippe
    Fournier, Jacques J. A.
    Tria, Assia
    2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 788 - 793
  • [50] Survey of Hardware Trojan Threats and Detection
    Hayashi, Yuichi
    Kawamura, Shinichi
    PROCEEDINGS OF THE 2020 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC EUROPE), 2020,