2016
DOI: 10.1007/s10836-016-5581-5
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Feature Selection of Hardware Layout: A Step toward Robust Hardware Trojan Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…Recent research in this field has explored machine learning methods for HT detection [41, 8890, 105111]. Generally, machine learning methods can be utilised for HT detection in the following aspects: providing automatic layout identification in RE‐based methods [88, 105, 106], providing run‐time HT detection architectures, which are trained by HT attack behaviours [107, 108], providing automatic feature analysis [112], and providing golden chips‐free HT detection techniques based on classification or clustering [41, 89, 90, 109111]. In particular, the machine learning method has its own specialties in feature extraction and image recognition, which makes it possible to reveal unknown HTs by monitoring suspicious behaviours and features.…”
Section: Future Directionsmentioning
confidence: 99%
“…Recent research in this field has explored machine learning methods for HT detection [41, 8890, 105111]. Generally, machine learning methods can be utilised for HT detection in the following aspects: providing automatic layout identification in RE‐based methods [88, 105, 106], providing run‐time HT detection architectures, which are trained by HT attack behaviours [107, 108], providing automatic feature analysis [112], and providing golden chips‐free HT detection techniques based on classification or clustering [41, 89, 90, 109111]. In particular, the machine learning method has its own specialties in feature extraction and image recognition, which makes it possible to reveal unknown HTs by monitoring suspicious behaviours and features.…”
Section: Future Directionsmentioning
confidence: 99%
“…Limited by the mechanical precision and the workmanship, various defects may exist such as the errors of solder joints, stains and elements damages. Nowadays, the main phases of the IC's production are distributed globally, including design, synthesis, fabrication and distribution [4]. This global cooperation model makes ICs become vulnerable to the HTs, which can leak secret information, invalidate the IC or cause other catastrophic consequences [5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…Most recently, a few machine learning based HT detection methods have been proposed [12][13][14][15][16]. Nasr and Abdulmageed [12] use machine learning to provide automatic layout identification in the reverse engineering-based detection method. However, this destructive detection method is typically expensive and time consuming, which also requires considerable manual efforts.…”
Section: Introductionmentioning
confidence: 99%
“…Most recently, a few machine learning based HT detection methods have been proposed [12–16]. Nasr and Abdulmageed [12] use machine learning to provide automatic layout identification in the reverse engineering‐based detection method.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation