A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework

被引:0
|
作者
Yang, Xue [1 ]
Wei, Congming [2 ,3 ]
Ding, Yaoling [2 ]
Sun, Shaofei [2 ]
Wang, An [2 ]
Chen, Jiazhe [4 ]
机构
[1] School of Computer Science and Technology, Beijing Institute of Technology, Beijing,100081, China
[2] School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing,100081, China
[3] Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu,610054, China
[4] China Information Technology Security Evaluation Center, Beijing, China
基金
中国国家自然科学基金;
关键词
Anomaly detection methods - Condition - Detection methods - Graph neural networks - Hardware Trojan detection - Linear time complexity - Manual intervention - Neighbourhood - Side-channel analysis - Waveform sets;
D O I
暂无
中图分类号
学科分类号
摘要
23
引用
收藏
页码:340 / 358
相关论文
共 50 条
  • [21] A Deep Learning Method Based on the Attention Mechanism for Hardware Trojan Detection
    Tang, Wenjing
    Su, Jing
    He, Jiaji
    Gao, Yuchan
    ELECTRONICS, 2022, 11 (15)
  • [22] A Hardware Trojan Detection Method Based on Side-channel Analysis
    Wang Xiaohan
    Li Xiongwei
    Xu Lu
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1042 - 1047
  • [23] Hardware Trojan Detection Based on Image Comparison
    Sun, Chen
    Guo, Xiaohui
    Li, Lingling
    Ma, Jingjing
    Lecture Notes on Data Engineering and Communications Technologies, 2022, 80 : 979 - 986
  • [24] Hardware Trojan Detection Based on Logical Testing
    Bazzazi, Amin
    Shalmani, Mohammad Taghi Manzuri
    Hemmatyar, Ali Mohammad Afshin
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (04): : 381 - 395
  • [25] Hardware Trojan Detection Based on the Distance Discrimination
    Wang Jianxin
    Wang Boren
    Qu Ming
    Zhang Lei
    Xiao Chaoen
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 404 - 407
  • [26] Hardware Trojan Detection Based on Signal Correlation
    Zhao, Wei
    Shen, Haihua
    Li, Huawei
    Li, Xiaowei
    2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 80 - 85
  • [27] Hardware Trojan Detection Based on Logical Testing
    Amin Bazzazi
    Mohammad Taghi Manzuri Shalmani
    Ali Mohammad Afshin Hemmatyar
    Journal of Electronic Testing, 2017, 33 : 381 - 395
  • [28] A Reverse Engineering-Based Framework Assisting Hardware Trojan Detection for Encrypted IPs
    Zhang, Tao
    Wang, Jian
    Chen, Zhe
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 1649 - 1652
  • [29] A neural network framework based on ConvNeXt for side-channel hardware Trojan detection
    Gao, Yuchan
    Su, Jing
    Li, Jia
    Wang, Shenglong
    Li, Chao
    ETRI JOURNAL, 2024,
  • [30] A method of implanting combinational hardware Trojan based on evolvable hardware
    Liu, Lijun
    Wang, Tao
    Wang, Xiaohan
    He, Tianyu
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 93