2022
DOI: 10.1109/access.2022.3173287
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Hardware Vulnerability Analysis Using Machine Learning

Abstract: Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to support its core functionalities. A typical SoC consists of diverse components gathered from third-party vendors to reduce SoC design cost and meet time-to-market constraints. Unfortunately, the participation of third-party companies in global supply chain introduces potential security vulnerabilities. There is a critical need to efficiently detect and mitigate hardware vulnerabilities. Machine learning has been successf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 111 publications
(107 reference statements)
0
4
0
Order By: Relevance
“…The authors in [12] use bitstream reverse engineering in combination with an unsupervised machine learning (ML) technique [13] for Trojan detection in FPGAs. ML-based techniques have been investigated for Trojan detection as described in [14], [15]. Specifically, works [16], [17] show success in using ML to detect Trojans mapped to FPGAs.…”
Section: B Fpga Trojan Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [12] use bitstream reverse engineering in combination with an unsupervised machine learning (ML) technique [13] for Trojan detection in FPGAs. ML-based techniques have been investigated for Trojan detection as described in [14], [15]. Specifically, works [16], [17] show success in using ML to detect Trojans mapped to FPGAs.…”
Section: B Fpga Trojan Countermeasuresmentioning
confidence: 99%
“…A LUT is selected if its topological rank is greater than the maximum rank of the Trojan trigger nets. However, we do not need to consider the entire set of Trojan trigger nets, just the number of triggers that can be inserted in the current LUT (lines [12][13][14][15]. If the number of trigger inputs is greater than the LUT inputs, then the (m − i − 1) triggers are selected to be input to the LUT where m is the maximum LUT input, and i is the current number of LUT inputs (lines [16][17][18][19].…”
Section: B Trojan Insertion In Fpgasmentioning
confidence: 99%
“…Unlike other reviews, this article delved into the practical application and effectiveness of various machine-learning techniques in software vulnerability detection and proposed a classification framework to illustrate the types of technologies employed by each method. Pan et al [27] carried out a literature review on hardware vulnerability analysis using machine learning. This review mainly investigated the application and results of machine-learning methods in the field of hardware vulnerability analysis.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [11] designed a smart electric energy meter printed circuit panel consistency detection system based on deep learning technology, which replaced the manual detection mode and was applied in laboratory testing work. The authors of [12] adopted the method of deep learning to detect PCB patch elements, but it had strict requirements on sample data and computing power. The required computing power cost was high, and operation power consumption was large, which could not be popularized in the on-site environment.…”
Section: Introductionmentioning
confidence: 99%