A survey on machine learning against hardware trojan attacks: Recent advances and challenges
Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …
inspired academic and industrial communities to explore its potential to address hardware …
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and …
This study reviews and analyses the research landscape for intrusion detection systems
(IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the …
(IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the …
Deep learning for anomaly detection: A survey
R Chalapathy, S Chawla - arXiv preprint arXiv:1901.03407, 2019 - arxiv.org
Anomaly detection is an important problem that has been well-studied within diverse
research areas and application domains. The aim of this survey is two-fold, firstly we present …
research areas and application domains. The aim of this survey is two-fold, firstly we present …
Aesmote: Adversarial reinforcement learning with smote for anomaly detection
X Ma, W Shi - IEEE Transactions on Network Science and …, 2020 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) play a vital role in securing today's Data-Centric
Networks. In a dynamic environment such as the Internet of Things (IoT), which is vulnerable …
Networks. In a dynamic environment such as the Internet of Things (IoT), which is vulnerable …
Brain-inspired golden chip free hardware trojan detection
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has
been extensively studied. However, the majority of works either rely on a golden chip, or …
been extensively studied. However, the majority of works either rely on a golden chip, or …
Conventional and machine learning approaches as countermeasures against hardware trojan attacks
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …
increasing at a steady pace. This rapid development drives the technology companies to …
Machine learning for hardware trojan detection: A review
KG Liakos, GK Georgakilas… - … on Electronics & …, 2019 - ieeexplore.ieee.org
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …
increasing at a steady pace. This rapid development drives the technology companies to …
Hardware IP trust validation: Learn (the untrustworthy), and verify
Increasing reliance on hardware Intellectual Property (IP) cores in modern system-on-chip
(SoC) design flow, often obtained from untrusted vendors distributed across the globe, can …
(SoC) design flow, often obtained from untrusted vendors distributed across the globe, can …
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention
R Mukherjee, SR Rajendran… - Journal of Cryptographic …, 2022 - Springer
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …
systems. A deployed electronic system with one or more undetected Hardware Trojan …
Fusion-on-field security and privacy preservation for IoT edge devices: Concurrent defense against multiple types of hardware trojan attacks
Internet of Things (IoT) devices have connected millions of houses around the globe via the
internet. In the recent past, threats due to hardware Trojan (HT) in the integrated circuits (IC) …
internet. In the recent past, threats due to hardware Trojan (HT) in the integrated circuits (IC) …