A survey on machine learning against hardware trojan attacks: Recent advances and challenges

Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …

Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and …

AM Aleesa, BB Zaidan, AA Zaidan… - Neural Computing and …, 2020 - Springer
This study reviews and analyses the research landscape for intrusion detection systems
(IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the …

Aesmote: Adversarial reinforcement learning with smote for anomaly detection

X Ma, W Shi - IEEE Transactions on Network Science and …, 2020 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) play a vital role in securing today's Data-Centric
Networks. In a dynamic environment such as the Internet of Things (IoT), which is vulnerable …

Conventional and machine learning approaches as countermeasures against hardware trojan attacks

KG Liakos, GK Georgakilas, S Moustakidis… - Microprocessors and …, 2020 - Elsevier
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …

Fusion-on-field security and privacy preservation for IoT edge devices: Concurrent defense against multiple types of hardware trojan attacks

H Mohammed, SR Hasan, F Awwad - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) devices have connected millions of houses around the globe via the
internet. In the recent past, threats due to hardware Trojan (HT) in the integrated circuits (IC) …

MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices

F Khalid, SR Hasan, S Zia, O Hasan… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Traditional learning-based approaches for runtime hardware Trojan (HT) detection require
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …

Overview of security for smart cyber-physical systems

F Khalid, S Rehman, M Shafique - Security of Cyber-Physical Systems …, 2020 - Springer
The tremendous growth of interconnectivity and dependencies of physical and cyber
domains in cyber-physical systems (CPS) makes them vulnerable to several security threats …

Register-transfer-level features for machine-learning-based hardware trojan detection

HS Choo, CY Ooi, M Inoue, N Ismail… - … on Fundamentals of …, 2020 - search.ieice.org
Register-transfer-level (RTL) information is hardly available for hardware Trojan detection. In
this paper, four RTL Trojan features related to branching statement are proposed. The …

[PDF][PDF] SVM 算法在硬件木马旁路分析检测中的应用

佟鑫, 李莹, 陈岚 - 电子与信息学报, 2020 - jeit.ac.cn
集成电路(ICs) 面临着硬件木马(HTs) 造成的严峻威胁. 传统的旁路检测手段中黄金模型不易获得
, 且隐秘的木马可以利用固硬件联合操作将恶意行为隐藏在常规的芯片运行中, 更难以检测 …

SIMCom: Statistical sniffing of inter-module communications for runtime hardware trojan detection

F Khalid, SR Hasan, O Hasan, M Shafique - Microprocessors and …, 2020 - Elsevier
Abstract Timely detection of Hardware Trojans (HTs) has become a major challenge for
secure integrated circuits. We present a run-time methodology for HT detection that employs …