2018
DOI: 10.1007/s10836-018-5726-9
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning for Hardware Security: Opportunities and Risks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 64 publications
(20 citation statements)
references
References 61 publications
0
20
0
Order By: Relevance
“…We identify the potential HT types at each stage of SoC development and examine the state-of-the-art HT countermeasures related to each stage. The recent success of machine learning (ML) techniques in many research domains has inspired both academic and industrial communities to explore the potential of applying ML to address various HT attacks [11], [56]. A number of achievements utilizing ML for HT defenses have emerged in the last decade.…”
Section: B Motivation and Contributionsmentioning
confidence: 99%
See 3 more Smart Citations
“…We identify the potential HT types at each stage of SoC development and examine the state-of-the-art HT countermeasures related to each stage. The recent success of machine learning (ML) techniques in many research domains has inspired both academic and industrial communities to explore the potential of applying ML to address various HT attacks [11], [56]. A number of achievements utilizing ML for HT defenses have emerged in the last decade.…”
Section: B Motivation and Contributionsmentioning
confidence: 99%
“…However, this important progress has not been systematically reviewed in previous surveys [4], [13], [14], [16], [21], [35], [39]. Elnaggar et al conducted a survey on the applications of ML in the general area of hardware security, including HT attacks, reverse engineering, IC counterfeiting, side-channel attacks, and IC overbuilding [56]. However, a dedicated survey on the applications of ML to HT defenses is still not available in the literature.…”
Section: B Motivation and Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Among all existing detection approaches, golden chip-free Trojan detection approaches have attracted wide attention in [2]. Recently, various supervised learning techniques are applied to the golden chip-free Trojan detection approaches [3]. However, the real case is that little knowledge of the Trojan under detection can be obtained, thus, the side-channel traces required in the training sets do not exist in practice.…”
mentioning
confidence: 99%