2018
DOI: 10.1007/978-3-030-00015-8_55
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…Each subset is referred as a cluster [27]. In [24], we have formulated the unsupervised hardware Trojan detection problem into two types of clustering based detection models, i.e., the partition-based model and the density-based model.…”
Section: Preliminary a Unsupervised Hardware Trojan Detection Methods Using Clustering Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…Each subset is referred as a cluster [27]. In [24], we have formulated the unsupervised hardware Trojan detection problem into two types of clustering based detection models, i.e., the partition-based model and the density-based model.…”
Section: Preliminary a Unsupervised Hardware Trojan Detection Methods Using Clustering Analysismentioning
confidence: 99%
“…Motivated by the above problems, we have proposed an unsupervised golden models-free hardware Trojan detection method using clustering analysis [24] which will be described in Section II-A as the preliminary. In [24], the major contribution is that we formulate the unsupervised hardware Trojan detection problem into two types of clustering based hardware Trojan detection models, the partition-based model and the density-based model. Then we exploit a clustering algorithm for unsupervised hardware Trojan detection to eliminate the need of simulated golden models and fabricated golden chips.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Recent research in this field has explored machine learning methods for HT detection [41, 8890, 105111]. Generally, machine learning methods can be utilised for HT detection in the following aspects: providing automatic layout identification in RE‐based methods [88, 105, 106], providing run‐time HT detection architectures, which are trained by HT attack behaviours [107, 108], providing automatic feature analysis [112], and providing golden chips‐free HT detection techniques based on classification or clustering [41, 89, 90, 109111]. In particular, the machine learning method has its own specialties in feature extraction and image recognition, which makes it possible to reveal unknown HTs by monitoring suspicious behaviours and features.…”
Section: Future Directionsmentioning
confidence: 99%