Evaluation of the Robustness against Adversarial Examples in Hardware-Trojan Detection

被引:0
|
作者
机构
关键词
714.2 Semiconductor Devices and Integrated Circuits - 716.1 Information Theory and Signal Processing - 723 Computer Software; Data Handling and Applications - 723.4 Artificial Intelligence - 903.1 Information Sources and Analysis - 913.1 Production Engineering;
D O I
暂无
中图分类号
学科分类号
摘要
11
引用
收藏
页码:5 / 8
相关论文
共 50 条
  • [1] Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists
    Nozawa, Kohei
    Hasegawa, Kento
    Hidano, Seira
    Kiyomoto, Shinsaku
    Hashimoto, Kazuo
    Togawa, Nozomu
    [J]. COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 341 - 359
  • [2] R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training
    Hasegawa, Kento
    Hidano, Seira
    Nozawa, Kohei
    Kiyomoto, Shinsaku
    Togawa, Nozomu
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (02) : 333 - 345
  • [3] R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training
    Hasegawa, Kento
    Hidano, Seira
    Nozawa, Kohei
    Kiyomoto, Shinsaku
    Togawa, Nozomu
    [J]. arXiv, 2022,
  • [4] Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists
    Yamashita, Kazuki
    Kato, Tomohiro
    Hasegawa, Kento
    Hidano, Seira
    Fukushima, Kazuhide
    Togawa, Nozomu
    [J]. Proceedings - 2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design, IOLTS 2022, 2022,
  • [5] Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists
    Yamashita, Kazuki
    Kato, Tomohiro
    Hasegawa, Kento
    Hidano, Seira
    Fukushima, Kazuhide
    Togawa, Nozomu
    [J]. 2022 IEEE 28TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2022), 2022,
  • [6] A method of hardware-trojan detection using design verification techniques
    Graduate school of Engineering, Oita University, 700 Dannoharu, Oita
    870-1192, Japan
    不详
    870-1192, Japan
    [J]. Adv. Intell. Sys. Comput., (978-987):
  • [7] A Method of Hardware-Trojan Detection Using Design Verification Techniques
    Hiramoto, Yushiro
    Ohtake, Satoshi
    [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 978 - 987
  • [8] Hardware-Trojan Detection Based on the Structural Features of Trojan Circuits Using Random Forests
    Kurihara, Tatsuki
    Togawa, Nozomu
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (07) : 1049 - 1060
  • [9] In-situ Trojan Authentication for Invalidating Hardware-Trojan Functions
    Oya, Masaru
    Shi, Youhua
    Yanagisawa, Masao
    Togawa, Nozomu
    [J]. PROCEEDINGS OF THE SEVENTEENTH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN ISQED 2016, 2016, : 152 - 157
  • [10] In-situ Trojan authentication for invalidating hardware-Trojan functions
    [J]. 2016, IEEE Computer Society (2016-May):