The remarkable success of machine learning (ML) in a variety of research domains has inspired academic and industrial communities to explore its potential to address hardware Trojan (HT) attacks. While numerous works have been published over the past decade, few survey papers, to the best of our knowledge, have systematically reviewed the achievements and analyzed the remaining challenges in this area. To fill this gap, this article surveys ML-based approaches against HT attacks available in the literature. In particular, we first provide a classification of all possible HT attacks and then review recent developments from four perspectives, i.e., HT detection, design-for-security (DFS), bus security, and secure architecture. Based on the review, we further discuss the lessons learned in and challenges arising from previous studies. Despite current work focusing more on chip-layer HT problems, it is notable that novel HT threats are constantly emerging and have evolved beyond chips and to the component, device, and even behavior layers, therein compromising the security and trustworthiness of the overall hardware ecosystem. Therefore, we divide the HT threats into four layers and propose a hardware Trojan defense (HTD) reference model from the perspective of the overall hardware ecosystem, therein categorizing the security threats and requirements in each layer to provide a guideline for future research in this direction.
Abstract:In this paper, a simple and efficient fractal-based approach is presented for capturing the effects of initial void ratio on the soil-water characteristic curve (SWCC) in a deformable unsaturated soil. In terms of testing results, the SWCCs (expressed by gravimetric water content) of the unsaturated soils at different initial void ratios were found to be mainly controlled by the air-entry value (ψ a ), while the fractal dimension (D) could be assumed to be constant. As a result, in contrast to the complexity of existing models, a simple and efficient model with only two parameters (i.e., D and ψ a ) was established for predicting the SWCC considering the effects of initial void ratio. The procedure for determining the model parameters with clear physical meaning were then elaborated. The applicability and accuracy of the proposed model were well demonstrated by comparing its predictions with four sets of independent experimental data from the tests conducted in current work, as well as the literature on a wide range of soils, including Wuhan Clay, Hefei and Guangxi expansive soil, Saskatchewan silt, and loess. Good agreements were obtained between the experimental data and the model predictions in all of the cases considered.
We seek to detect statistically significant temporal or spatial changes in either the underlying process the sensor network is monitoring or in the network operation itself. These changes may point to faults, adversarial threats, misbehavior, or other anomalies that require intervention. To that end, we introduce a new statistical anomaly detection framework that uses Markov models to characterize the "normal" behavior of the sensor network. We develop a series of Markov models, including tree-indexed Markov chains which can model its spatial structure. For each model, an anomaly-free probability law is estimated from past traces. We leverage large deviations techniques to develop optimal anomaly detection rules for each corresponding Markov model, assessing whether its most recent empirical measure is consistent with the anomaly-free probability law. A series of simulation results, some with real sensor data, validate the effectiveness of the proposed anomaly detection algorithms.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.