A survey on machine learning against hardware trojan attacks: Recent advances and challenges

Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …

Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective

G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …

Brain-inspired golden chip free hardware trojan detection

S Faezi, R Yasaei, A Barua… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has
been extensively studied. However, the majority of works either rely on a golden chip, or …

Conventional and machine learning approaches as countermeasures against hardware trojan attacks

KG Liakos, GK Georgakilas, S Moustakidis… - Microprocessors and …, 2020 - Elsevier
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …

Machine learning for hardware trojan detection: A review

KG Liakos, GK Georgakilas… - … on Electronics & …, 2019 - ieeexplore.ieee.org
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …

Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models

FK Lodhi, SR Hasan, O Hasan… - Design, Automation & …, 2017 - ieeexplore.ieee.org
Globalization trends in integrated circuit (IC) design are leading to increased vulnerability of
ICs against hardware Trojans (HT). Recently, several side channel parameters based …

A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

R Mukherjee, SR Rajendran… - Journal of Cryptographic …, 2022 - Springer
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …

Fusion-on-field security and privacy preservation for IoT edge devices: Concurrent defense against multiple types of hardware trojan attacks

H Mohammed, SR Hasan, F Awwad - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) devices have connected millions of houses around the globe via the
internet. In the recent past, threats due to hardware Trojan (HT) in the integrated circuits (IC) …

Detecting RTL trojans using artificial immune systems and high level behavior classification

F Zareen, R Karam - 2018 Asian Hardware Oriented Security …, 2018 - ieeexplore.ieee.org
Security assurance in a computer system can be viewed as distinguishing between self and
non-self. Artificial Immune Systems (AIS) are a class of machine learning (ML) techniques …

MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices

F Khalid, SR Hasan, S Zia, O Hasan… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Traditional learning-based approaches for runtime hardware Trojan (HT) detection require
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …