A survey on machine learning against hardware trojan attacks: Recent advances and challenges

Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …

Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and …

AM Aleesa, BB Zaidan, AA Zaidan… - Neural Computing and …, 2020 - Springer
This study reviews and analyses the research landscape for intrusion detection systems
(IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the …

Deep learning for anomaly detection: A survey

R Chalapathy, S Chawla - arXiv preprint arXiv:1901.03407, 2019 - arxiv.org
Anomaly detection is an important problem that has been well-studied within diverse
research areas and application domains. The aim of this survey is two-fold, firstly we present …

Aesmote: Adversarial reinforcement learning with smote for anomaly detection

X Ma, W Shi - IEEE Transactions on Network Science and …, 2020 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) play a vital role in securing today's Data-Centric
Networks. In a dynamic environment such as the Internet of Things (IoT), which is vulnerable …

Brain-inspired golden chip free hardware trojan detection

S Faezi, R Yasaei, A Barua… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has
been extensively studied. However, the majority of works either rely on a golden chip, or …

Conventional and machine learning approaches as countermeasures against hardware trojan attacks

KG Liakos, GK Georgakilas, S Moustakidis… - Microprocessors and …, 2020 - Elsevier
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …

Machine learning for hardware trojan detection: A review

KG Liakos, GK Georgakilas… - … on Electronics & …, 2019 - ieeexplore.ieee.org
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …

Hardware IP trust validation: Learn (the untrustworthy), and verify

T Hoque, J Cruz, P Chakraborty… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Increasing reliance on hardware Intellectual Property (IP) cores in modern system-on-chip
(SoC) design flow, often obtained from untrusted vendors distributed across the globe, can …

A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

R Mukherjee, SR Rajendran… - Journal of Cryptographic …, 2022 - Springer
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …

Fusion-on-field security and privacy preservation for IoT edge devices: Concurrent defense against multiple types of hardware trojan attacks

H Mohammed, SR Hasan, F Awwad - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) devices have connected millions of houses around the globe via the
internet. In the recent past, threats due to hardware Trojan (HT) in the integrated circuits (IC) …