Review of machine learning based hardware Trojan detection methods
As integrated circuit (IC) design gets more complicated, outsourcing parts of the IC design and fabrication is commonly applied to simplify the production and reduce the cost. This leads to the threat of malicious manipulation to the design by the third parties involved. Such threat is considered as...
Main Authors: | Choo, H. S., Ooi, C. Y., Inoue, M., Ismail, N., Kok, C. H. |
---|---|
Format: | Article |
Published: |
Science and Technology Research Institute for Defence
2019
|
Subjects: |
Similar Items
-
Register-transfer-level features for machine-learning-based hardware trojan detection
by: Choo, Hau Sim, et al.
Published: (2020) -
Hardware trojan identification using machine learning-based classification
by: Noor, N. Q. M., et al.
Published: (2017) -
Improving hardware trojan detection coverage by utilizing features at different abstraction levels.
by: Choo, Hau Sim, et al.
Published: (2023) -
Research on hardware Trojan defense
by: Kan WANG,Hao CHEN,Xu-guang GUAN,Yong GU
Published: (2017-09-01) -
Accelerating extreme learning machine on FPGA by hardware implementation of given rotation - GRD
by: Tan, C. Y., et al.
Published: (2019)