2021 22nd International Symposium on Quality Electronic Design (ISQED) 2021
DOI: 10.1109/isqed51717.2021.9424362
|View full text |Cite
|
Sign up to set email alerts
|

Application of Machine Learning in Hardware Trojan Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…from soft adware which only seek to show ads to the users. At the same time, there also is a vast literature about the application of ML models to detect HTHs, as it is demonstrated by a number of recently published surveys on the topic [36][37][38]. All these works agree in highlighting the following research directions that have not been taken into account yet:…”
Section: Introduction and Related Workmentioning
confidence: 94%
“…from soft adware which only seek to show ads to the users. At the same time, there also is a vast literature about the application of ML models to detect HTHs, as it is demonstrated by a number of recently published surveys on the topic [36][37][38]. All these works agree in highlighting the following research directions that have not been taken into account yet:…”
Section: Introduction and Related Workmentioning
confidence: 94%
“…Despite the substantial advancements in machine learning (ML)-based trojan detection techniques aiming to reduce reliance on a golden model, we opt for utilizing a reference model for trojan detection. ML-based methods are still in their early stages [25,32] and encounter difficulties in automating and ensuring accuracy, which poses risks of misclassifying trojans and allowing them to evade detection. Nonetheless, our approach remains adaptable to situations where a golden model is unavailable, relying on test generation driven by coverage of infrequent triggers to systematically uncover potential hidden malicious circuitry within the design.…”
Section: Motivationmentioning
confidence: 99%
“…Trojans can be inserted locally or distributed throughout the network. The payload and the trigger part of the Trojan can be digital or analog, as malicious modification can occur when the temperature of the chip changes [9].…”
Section: Introductionmentioning
confidence: 99%