A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework

被引:0
|
作者
Yang, Xue [1 ]
Wei, Congming [2 ,3 ]
Ding, Yaoling [2 ]
Sun, Shaofei [2 ]
Wang, An [2 ]
Chen, Jiazhe [4 ]
机构
[1] School of Computer Science and Technology, Beijing Institute of Technology, Beijing,100081, China
[2] School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing,100081, China
[3] Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu,610054, China
[4] China Information Technology Security Evaluation Center, Beijing, China
基金
中国国家自然科学基金;
关键词
Anomaly detection methods - Condition - Detection methods - Graph neural networks - Hardware Trojan detection - Linear time complexity - Manual intervention - Neighbourhood - Side-channel analysis - Waveform sets;
D O I
暂无
中图分类号
学科分类号
摘要
23
引用
收藏
页码:340 / 358
相关论文
共 50 条
  • [41] A PCA and Mahalanobis distance-based detection method for logical hardware Trojan
    Huang, Jiaoying
    Yang, Daming
    Gao, Cheng
    Fu, Chengcheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (12):
  • [42] MULTI ADAPTIVE HARDWARE TROJAN DETECTION METHOD BASED ON POWER CHACTERISTICS TEMPLATE
    Zhang, Lei
    Sun, Kewang
    Cui, Qi
    Wang, Sixiang
    Li, Xiaolin
    Di, Jianguo
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 414 - 418
  • [43] Hardware Trojan Detection Combines with Machine Learning: an Isolation Forest-based Detection Method
    Hu, Taifeng
    Wu, Liji
    Zhang, Xiangmin
    Liao, Zhaopo
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 96 - 103
  • [44] XG Boost Algorithm based Hardware Trojan Detection in Hardware Circuits
    Vennila, A.
    Balambigai, S.
    Arulmurugan, A.
    Hema, M.
    Kamali, M.
    Kishore, M.
    2023 5th International Conference on Electrical, Computer and Communication Technologies, ICECCT 2023, 2023,
  • [45] CRC-Based Hardware Trojan Detection for Improved Hardware Security
    Mohankumar, N.
    Jayakumar, M.
    Nirmala Devi, M.
    Lecture Notes in Electrical Engineering, 2018, 471 : 381 - 389
  • [46] Hardware Trojan detection algorithm based on deep learning
    Liu Z.
    Zhang M.
    Chi Y.
    Li Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (06): : 37 - 45
  • [47] Deep Learning Based Approach for Hardware Trojan Detection
    Amrita Vishwa Vidyapeetham, Center for Cybersecurity Systems and Networks, Amritapuri, India
    不详
    Proc. - IEEE Int. Symp. Smart Electron. Syst., iSES, 1600, (177-182): : 177 - 182
  • [48] Activity Factor Based Hardware Trojan Detection and Localization
    Yongkang Tang
    Liang Fang
    Shaoqing Li
    Journal of Electronic Testing, 2019, 35 : 293 - 302
  • [49] Power Analysis-based Hardware Trojan Detection
    Xue, Hao
    Li, Shuo
    Ren, Saiyu
    2017 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2017, : 253 - 257
  • [50] On Reverse Engineering-Based Hardware Trojan Detection
    Department of Electrical and Computer Engineering, University of Maryland, College Park
    MD
    20742, United States
    不详
    FL
    32611, United States
    IEEE Trans Comput Aided Des Integr Circuits Syst, 1 (49-57):