2018 8th International Symposium on Embedded Computing and System Design (ISED) 2018
DOI: 10.1109/ised.2018.8703990
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation and Detection of Hardware Trojan for Real-Time Many-Core Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 9 publications
0
0
0
Order By: Relevance
“…For example, [13] applied ML to detect flooding attacks. First, she extracted enough NoC-related attribute parameters and analyzed them for soundness; [14] selected a large number of NoC features and then used a large number of classification machine learning algorithms to detect hardware Trojans in order to achieve the best results, but sometimes there are oversaturation and detection efficiency is not high ; [15] focuses on using the threshold equation to detect HT, but he uses less machine learning and does not use different benchmark programs to test the effect; [16]'s work simulates four types of HT that can be stimulated by encountering specific conditions Hardware Trojans, using a decision tree, SVM and KNN to detect hardware Trojans respectively.…”
Section: Related Workmentioning
confidence: 99%
“…For example, [13] applied ML to detect flooding attacks. First, she extracted enough NoC-related attribute parameters and analyzed them for soundness; [14] selected a large number of NoC features and then used a large number of classification machine learning algorithms to detect hardware Trojans in order to achieve the best results, but sometimes there are oversaturation and detection efficiency is not high ; [15] focuses on using the threshold equation to detect HT, but he uses less machine learning and does not use different benchmark programs to test the effect; [16]'s work simulates four types of HT that can be stimulated by encountering specific conditions Hardware Trojans, using a decision tree, SVM and KNN to detect hardware Trojans respectively.…”
Section: Related Workmentioning
confidence: 99%