An AI Architecture with the Capability to Classify and Explain Hardware Trojans

被引:0
|
作者
Whitten, Paul [1 ]
Wolff, Francis [1 ]
Papachristou, Chris [1 ]
机构
[1] Case School of Engineering, Case Western Reserve University, Cleveland,OH, United States
来源
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Support vector machines
引用
收藏
相关论文
共 50 条
  • [31] Can Overclocking Detect Hardware Trojans?
    Meng, Xingyu
    Hassan, Rakibul
    Dinakrrao, Sai Manoj Pudukotai
    Basu, Kanad
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [32] The Novel Design Method of Hardware Trojans
    Wei, Zhengyou
    Feng, Wenfeng
    Li, Lei
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 173 - 176
  • [33] Hard to Detect Combinational Hardware Trojans
    Das, Nilanjana
    Saha, Mousumi
    Sikdar, Biplab K.
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2018), 2018, : 194 - 198
  • [34] Stealth Assessment of Hardware Trojans in a Microcontroller
    Reece, Trey
    Limbrick, Daniel B.
    Wang, Xiaowen
    Kiddie, Bradley T.
    Robinson, William H.
    2012 IEEE 30TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2012, : 139 - 142
  • [35] Thermal Scans for Detecting Hardware Trojans
    Cozzi, Maxime
    Galliere, Jean-Marc
    Maurine, Philippe
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2018, 2018, 10815 : 117 - 132
  • [36] An Attribute Based Classification of Hardware Trojans
    Moein, Samer
    Khan, Salman
    Gulliver, T. Aaron
    Gebali, Fayez
    El-Kharashi, M. Watheq
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 351 - 356
  • [37] Hardware Trojans: current challenges and approaches
    Jacob, Nisha
    Merli, Dominik
    Heyszl, Johann
    Sigl, Georg
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2014, 8 (06): : 264 - 273
  • [38] Test Generation for Combinational Hardware Trojans
    Wang, Sying-Jyan
    Wei, Jhih-Yu
    Huang, Shih-Heng
    Li, Katherine Shu-Min
    PROCEEDINGS OF THE 2016 IEEE ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST 2016), 2016,
  • [39] Exploiting hardware obfuscation methods to prevent and detect hardware Trojans
    Yu, Qiaoyan
    Dofe, Jaya
    Zhang, Zhiming
    Midwest Symposium on Circuits and Systems, 2017, 2017-August : 819 - 822
  • [40] Simulation for strategic hardware Trojans testing
    2018, Nelson Publishing Inc. (57):