Detection method of Golden Chip-Free Hardware Trojan based on the combination of ResNeXt structure and attention mechanism

S Chen, T Wang, Z Huang, X Hou - Computers & Security, 2023 - Elsevier
Since 2007, the use of side-channel data to detect hardware Trojans (HT) has been widely
studied. Machine learning methods are widely used in the detection of hardware Trojans …

Hardware Trojan Dataset of RISC-V and Web3 Generated with ChatGPT-4

VT Hayashi, WV Ruggiero - Data, 2024 - mdpi.com
Although hardware trojans impose a relevant threat to the hardware security of RISC-V and
Web3 applications, existing datasets have a limited set of examples, as the most famous …

Detection of Hardware Trojan using CNN with Residual Network

A Roy, P Panwar, J Kokila… - 2022 IEEE 6th …, 2022 - ieeexplore.ieee.org
Due to very high demand of low cost IoTs and smart devices, a lot of company outsources
their design for fabrication to third party. This raises a deep security concern of malicious …

[图书][B] Golden Chip-Free Hardware Trojan Detection Through Side-Channel Analysis Using Machine Learning

R Yasaei - 2021 - search.proquest.com
Abstract Design and fabrication outsourcing has made integrated circuits vulnerable to
malicious modifications by third parties known as hardware Trojan (HT). Over the last …

Automated Detection of Hardware Trojans using Power Side-Channel Analysis and VGG-Net

B Dakhale, K Vipinkumar, K Narotham… - … on Paradigm Shifts …, 2023 - ieeexplore.ieee.org
With the expanding usage of electronic devices such as smartphones and smartwatches in
daily life, the need for advanced Integrated Circuits (ICs) is also increasing. Corporations are …