2020
DOI: 10.1109/access.2020.2965016
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges

Abstract: The remarkable success of machine learning (ML) in a variety of research domains has inspired academic and industrial communities to explore its potential to address hardware Trojan (HT) attacks. While numerous works have been published over the past decade, few survey papers, to the best of our knowledge, have systematically reviewed the achievements and analyzed the remaining challenges in this area. To fill this gap, this article surveys ML-based approaches against HT attacks available in the literature. In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 119 publications
(53 citation statements)
references
References 130 publications
0
33
0
Order By: Relevance
“…Trojans (also called Trojan horse) are the dominant type of malware that imitate the behavior of normal programs and real applications to do a specific function, but in fact, do another. This is to trick users into downloading and installing them, so they can hijack users' credentials (e.g., at the time of login to the system), and run harmful tasks such as formatting hard disk, deleting files, or running applications that can defeats system security or authentication procedures [23]. The main target of Trojans is to have full control of the infected system remotely, so they can damage system resources including files and data stored in the HDD, and sometimes they can deny access to essential system services [24].…”
Section: Trojansmentioning
confidence: 99%
“…Trojans (also called Trojan horse) are the dominant type of malware that imitate the behavior of normal programs and real applications to do a specific function, but in fact, do another. This is to trick users into downloading and installing them, so they can hijack users' credentials (e.g., at the time of login to the system), and run harmful tasks such as formatting hard disk, deleting files, or running applications that can defeats system security or authentication procedures [23]. The main target of Trojans is to have full control of the infected system remotely, so they can damage system resources including files and data stored in the HDD, and sometimes they can deny access to essential system services [24].…”
Section: Trojansmentioning
confidence: 99%
“…Attackers try to undermine these three security aspects and SoC designers are required to obtain and keep the security goals to safeguard the system. While NoC security has been surveyed briefly in some previous works [16]- [19], to the best of our knowledge, there is no solid work that surveys the recent security solutions for various NoC technologies. This paper covers both the different attack models and the proposed countermeasures for wired, wireless, and 3D NoCs.…”
Section: Introduction E Ver Increasing Vlsi Technology Shrinkage Has Enabledmentioning
confidence: 99%
“…The previous literature has some HTs reviews, which has some limitations when compared with this article. Huang et al [ 46 ] discussed in detail many HT detection and prevention techniques that are based on machine learning (ML). However, the credibility model is a bit outdated, and the testing stage is not revised to a semi-trusted state.…”
Section: Introductionmentioning
confidence: 99%