Plusquellic, “Trojan detection based on delay variations measured using a high-precision, low-overhead embedded test structure,” in Proc. of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST12) , pp. 75–82, 2012....
This paper proposes a runtime hardware Trojan detection method which is geared towards detecting such advanced Trojans. The principle of this method is to guard a set of concerned signals, and initiate a hardware interrupt request ...
IEEE Des. Test (2013) J.I. Lieberman, White Paper: National Security Aspects of the Global Migration of the US Semiconductor Industry,... Y. Jin, Y. Makris, Hardware Trojan detection using path delay fingerprint, in: IEEE International Workshop on... B. Cha, S.K. Gupta, Trojan detecti...
Long activation time is a major concern during the detection process. In this paper, we propose a novel approach for efficiently accelerating Trojan activation by increasing the transition activity of rare bits. In particular, the proposed approach increases the bit-level transition activity by ...
[IEEE 2017 IEEE International Test Conference (ITC) - Fort Worth, TX (2017.10.31-2017.11.2)] 2017 IEEE International Test Conference (ITC) - Advancing test... K Chakravadhanula,V Chickermane,P Cunningham,... 被引量: 0发表: 2017年 [IEEE 2017 IEEE International Test Conference (ITC) - ...
关键词: security of data Trojan activation time Trojan activity authentication stand point circuit topology dummy flip-flop insertion procedure fabless semiconductor industry functional Trojan hardware Trojan circuit hardware Trojan detection 会议名称: IEEE International Workshop on Hardware-oriented Security &...
one-class SVMone-class support vector machine (SVM)reverse-engineering (RE)-based HT detectionreverse-engineering based hardware Trojan detection... Bao, Chongxi,D Forte,Srivastava, Ankur - Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on 被引量: 15发表: 2016年 On ...
As traditional testing methods fall short in finding hardware Trojans, several specialized detection methods have surfaced. To facilitate research in this area and embed internal barriers to prevent Trojan attacks both at the design level and at the manufacturing level, we propose a Design-for-...
However, in this paper we show how Deep Learning can be used to successfully detect and identify the trigger encoded data, in order to protect a DNA sequencing pipeline from Trojan attacks. The result shows nearly up to 100% accuracy in detection in such a novel Trojan attack scenario even ...
Deepinspect: A black-box trojan detection and mitiga- tion framework for deep neural networks. In IJCAI, pages 4658–4664, 2019. 3 [10] Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moe¨llic, Jean-Baptiste Rigaud, and Jean-Luc Danger. Laser-induced...