A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework

被引:0
|
作者
Yang, Xue [1 ]
Wei, Congming [2 ,3 ]
Ding, Yaoling [2 ]
Sun, Shaofei [2 ]
Wang, An [2 ]
Chen, Jiazhe [4 ]
机构
[1] School of Computer Science and Technology, Beijing Institute of Technology, Beijing,100081, China
[2] School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing,100081, China
[3] Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu,610054, China
[4] China Information Technology Security Evaluation Center, Beijing, China
基金
中国国家自然科学基金;
关键词
Anomaly detection methods - Condition - Detection methods - Graph neural networks - Hardware Trojan detection - Linear time complexity - Manual intervention - Neighbourhood - Side-channel analysis - Waveform sets;
D O I
暂无
中图分类号
学科分类号
摘要
23
引用
收藏
页码:340 / 358
相关论文
共 50 条
  • [1] A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework
    Yang, Xue
    Wei, Congming
    Ding, Yaoling
    Sun, Shaofei
    Wang, An
    Chen, Jiazhe
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT I, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14586 : 340 - 358
  • [2] A machine learning based golden-free detection method for command-activated hardware Trojan
    Shang, Ning
    Wang, An
    Ding, Yaoling
    Gai, Keke
    Zhu, Liehuang
    Zhang, Guoshuang
    INFORMATION SCIENCES, 2020, 540 (292-307) : 292 - 307
  • [3] A framework for hardware trojan detection based on contrastive learning
    Jiang, Zijing
    Ding, Qun
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [4] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Zhang, Lei
    Dong, Youheng
    Wang, Jianxin
    Xiao, Chaoen
    Ding, Ding
    CHINA COMMUNICATIONS, 2019, 16 (12) : 100 - 110
  • [5] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Lei Zhang
    Youheng Dong
    Jianxin Wang
    Chaoen Xiao
    Ding Ding
    中国通信, 2019, 16 (12) : 100 - 110
  • [6] Hardware Trojan detection method based on circuit activity
    Zhao Y.
    Xie X.
    Liu Y.
    Liu A.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2018, 46 (02): : 90 - 94
  • [7] A Hardware Trojan Detection Method Design Based on TensorFlow
    Wu, Wenzhi
    Wei, Ying
    Ye, Ruizhe
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11910 LNCS : 244 - 252
  • [8] A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits
    Liu, Qiang
    Zhao, Pengyong
    Chen, Fuqiang
    IEEE ACCESS, 2019, 7 : 44632 - 44644
  • [9] Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection
    Sarihi, Amin
    Patooghy, Ahmad
    Jamieson, Peter
    Badawy, Abdel-Hameed A.
    arXiv, 2023,
  • [10] Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection
    Sarihi, Amin
    Patooghy, Ahmad
    Jamieson, Peter
    Badawy, Abdel-Hameed A.
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (10): : 14295 - 14329