An AI Architecture with the Capability to Classify and Explain Hardware Trojans

被引:0
|
作者
Whitten, Paul [1 ]
Wolff, Francis [1 ]
Papachristou, Chris [1 ]
机构
[1] Case School of Engineering, Case Western Reserve University, Cleveland,OH, United States
来源
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Support vector machines
引用
收藏
相关论文
共 50 条
  • [41] Hardware Trojans in Wireless Cryptographic ICs
    Jin, Yier
    Makris, Yiorgos
    IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01): : 26 - 35
  • [42] Hardware Trojans: Threats, Detection, and Prevention
    Xiao, Chaoen
    Chang, Xiangze
    Wang, Jianxin
    Zhang, Lei
    Xu, Hongke
    Wu, Xinwei
    Zheng, Yuzheng
    ACM International Conference Proceeding Series, 2023, : 529 - 533
  • [43] Can overclocking detect hardware trojans?
    Meng, Xingyu
    Hassan, Rakibul
    Dinakrrao, Sai Manoj Pudukotai
    Basu, Kanad
    Proceedings - IEEE International Symposium on Circuits and Systems, 2021, 2021-May
  • [44] Implementing Hardware Trojans: Experiences from a Hardware Trojan Challenge
    Becker, Georg T.
    Lakshminarasimhan, Ashwin
    Lin, Lang
    Srivathsa, Sudheendra
    Suresh, Vikram B.
    Burelson, Wayne
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 301 - 304
  • [45] Covert Communication Channels Based On Hardware Trojans: Open-Source Dataset and AI-Based Detection
    Diaz-Rizo, Alan Rodrigo
    Abdelazim, Abdelrahman Emad
    Aboushady, Hassan
    Stratigopoulos, Haralampos-G.
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 101 - 106
  • [46] Covert Communication Channels Based On Hardware Trojans: Open-Source Dataset and AI-Based Detection
    Daaz-Rizo, Alan Rodrigo
    Abdelazim, Abdelrahman Emad
    Aboushady, Hassan
    Stratigopoulos, Haralampos-G.
    Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, 2024, : 101 - 106
  • [47] Identify Hardware Trojans Based on Delay Feature
    Song T.
    Huang Z.
    Yan A.
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2022, 34 (04): : 515 - 521
  • [48] Design and analysis of hardware Trojans in approximate circuits
    Dou, Yuqin
    Wang, Chenghua
    Gu, Chongyan
    O'Neill, Maire
    Liu, Weiqiang
    ELECTRONICS LETTERS, 2022, 58 (05) : 197 - 199
  • [49] Detecting Hardware Trojans: A Tale of Two Techniques
    Malik, Sharad
    PROCEEDINGS OF THE 15TH CONFERENCE ON FORMAL METHODS IN COMPUTER-AIDED DESIGN (FMCAD 2015), 2015, : 6 - 6
  • [50] Test Pattern Superposition to Detect Hardware Trojans
    Nigh, Chris
    Orailoglu, Alex
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 25 - 30