Ten years of hardware Trojans: a survey from the attacker's perspective
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …
reliable and effective defenses, it is important to figure out how hardware Trojans are …
[HTML][HTML] Hardware trojans in chips: A survey for detection and prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Online anomaly detection in surveillance videos with asymptotic bound on false alarm rate
Anomaly detection in surveillance videos is attracting an increasing amount of attention.
Despite the competitive performance of recent methods, they lack theoretical performance …
Despite the competitive performance of recent methods, they lack theoretical performance …
Detecting hardware trojans in PCBs using side channel loopbacks
Malicious modifications to printed circuit boards (PCBs) are known as hardware Trojans.
These may arise when malafide third parties alter PCBs premanufacturing or …
These may arise when malafide third parties alter PCBs premanufacturing or …
Design of hardware trojans and its impact on cps systems: A comprehensive survey
The ever-increasing demand for sophisticated cyber-physical systems (CPS), combined with
the fabless model, led to vulnerability exploits in the IC supply chain, especially the insertion …
the fabless model, led to vulnerability exploits in the IC supply chain, especially the insertion …
[HTML][HTML] Self-supervised learning for online anomaly detection in high-dimensional data streams
In this paper, we address the problem of detecting and learning anomalies in high-
dimensional data-streams in real-time. Following a data-driven approach, we propose an …
dimensional data-streams in real-time. Following a data-driven approach, we propose an …
[HTML][HTML] Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a …
J Hou, Z Liu, Z Yang, C Yang - Micromachines, 2024 - mdpi.com
Convolutional neural networks (CNNs) have demonstrated significant superiority in modern
artificial intelligence (AI) applications. To accelerate the inference process of CNNs …
artificial intelligence (AI) applications. To accelerate the inference process of CNNs …
Scalable detection of hardware trojans using ATPG-based activation of rare events
A Jayasena, P Mishra - … Aided Design of Integrated Circuits and …, 2023 - ieeexplore.ieee.org
Semiconductor supply chain vulnerability is a major concern in designing trustworthy
systems. Malicious implants, popularly known as hardware Trojans (HTs), can get …
systems. Malicious implants, popularly known as hardware Trojans (HTs), can get …
[PDF][PDF] 基于XGBoost 的混合模式门级硬件木马检测方法
张颖, 李森, 陈鑫, 姚嘉祺, 毛志明 - 电子与信息学报, 2021 - jeit.ac.cn
针对恶意的第三方厂商在电路设计阶段中植入硬件木马的问题, 该文提出一种基于XGBoost
的混合模式门级硬件木马检测方法. 该检测方法将电路的每个线网类型作为节点, 采用混合模式3 …
的混合模式门级硬件木马检测方法. 该检测方法将电路的每个线网类型作为节点, 采用混合模式3 …
Hybrid multi‐level hardware Trojan detection platform for gate‐level netlists based on XGBoost
Y Zhang, S Li, X Chen, J Yao, Z Mao… - IET Computers & …, 2022 - Wiley Online Library
Coping with the problem of malicious third‐party vendors implanting Hardware Trojan (HT)
in the circuit design stage, this paper proposes a hybrid‐mode gate‐level hardware Trojan …
in the circuit design stage, this paper proposes a hybrid‐mode gate‐level hardware Trojan …