2020 5th International Conference on Communication and Electronics Systems (ICCES) 2020
DOI: 10.1109/icces48766.2020.9137882
|View full text |Cite
|
Sign up to set email alerts
|

System Level Hardware Trojan Detection Using Side-Channel Power Analysis and Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 12 publications
0
1
0
Order By: Relevance
“…With the booming development of computer vision, vision-based techniques are one of the hot research topics in the last decade. A machine learning algorithm based on power analysis was proposed in [10], which aims to obtain the hardware Trojan infection algorithm and use machine learning to detect hardware Trojan implantation. One HT classification method is called Hardware Trojan Learning Analysis (ATLAS) [11], which identifies HT-infected circuits using a gradient boosting (GB) model on data from the gate-level netlist (GLN) stage.…”
Section: Introductionmentioning
confidence: 99%
“…With the booming development of computer vision, vision-based techniques are one of the hot research topics in the last decade. A machine learning algorithm based on power analysis was proposed in [10], which aims to obtain the hardware Trojan infection algorithm and use machine learning to detect hardware Trojan implantation. One HT classification method is called Hardware Trojan Learning Analysis (ATLAS) [11], which identifies HT-infected circuits using a gradient boosting (GB) model on data from the gate-level netlist (GLN) stage.…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, detection approaches based on emission of light [5], or thermal and power maps [6], also seriously depend on relevant instruments' resolution and the area of Trojan circuit. Power dissipation can be adopted to achieve the Trojan horse detection effectively [7,8], but the test system is very complex since it needs additional test circuit and effective test patterns. HT detection can be fulfilled based on the path delay of ring oscillator networks [9], but it is at the cost of some areas to guarantee a high detection resolution.…”
mentioning
confidence: 99%