2017 IEEE 23rd International Symposium on on-Line Testing and Robust System Design (IOLTS) 2017
DOI: 10.1109/iolts.2017.8046227
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojans classification for gate-level netlists using multi-layer neural networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
87
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 102 publications
(93 citation statements)
references
References 10 publications
0
87
0
Order By: Relevance
“…25 First, compare the experimental results of Recall indicators, as shown in Figure 9. We can see that the RS232-T1100, RS232-T1200, RS232-T1300, RS232-T1400, RS232-T1500, and s35932-T100 netlists use the XGBoost-51 method, which is better than the MNN-11 25 detection effect in the Recall indicators. Although the average Recall of XGBoost-51 is lower than that of MNN-11, 25 it is also a good result.…”
Section: Comparison Of Experimental Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…25 First, compare the experimental results of Recall indicators, as shown in Figure 9. We can see that the RS232-T1100, RS232-T1200, RS232-T1300, RS232-T1400, RS232-T1500, and s35932-T100 netlists use the XGBoost-51 method, which is better than the MNN-11 25 detection effect in the Recall indicators. Although the average Recall of XGBoost-51 is lower than that of MNN-11, 25 it is also a good result.…”
Section: Comparison Of Experimental Resultsmentioning
confidence: 99%
“…Experimental results of existing machine-learningbased hardware-Trojan detection methods So far, some existing machine-learning hardware-Trojan detection methods are as follows: support vector machine (SVM)-based hardware-Trojan detection method, 22 neural network (NN)-based hardware-Trojan detection method, 23 random forest (RF)-based hardware-Trojan detection method, 24 and multi-layer neural network (MNN)-based hardware-Trojan detection method. 25 The true positive rate (TPR) and the true negative rate (TNR) are used by Hasegawa et al 22 and Inoue et al 26 to evaluate the detection results. In addition to the TPR and the TNR, Hasegawa et al 24 also used the Accuracy, the Precision, and the F-measure to evaluate the detection results and proposed that the F-measure is the best to measure the results very well.…”
Section: Hardware-trojan Detection Process For Gate-level Netlistmentioning
confidence: 99%
See 1 more Smart Citation
“…The Trojan features from the Trojan nets are extracted in [12] and a random forest classifier is applied to obtain the optimal set of Trojan features from the nets. Higher computational power is its limitations and requires more resources, since the model involves a lots of tree structure Classification of Hardware Trojan using multilayer neural network is discussed in [13]. The processing time is more to train the dataset for decision making which is its limitations since the hidden layers are based on feature set.…”
Section: Related Workmentioning
confidence: 99%
“…To defeat HTs and prevent HT-infected chips from being supplied to the market, researchers have proposed various HT detection techniques over the past decade [1], [2]. Benefiting from the development of training algorithms and computational power, very recent research shows a new trend in adopting machine learning (ML) approaches for HT detection [3], [4].…”
Section: Introductionmentioning
confidence: 99%