A Hardware Trojan Detection Method Design Based on TensorFlow

被引:0
|
作者
Wu, Wenzhi [1 ,3 ]
Wei, Ying [2 ]
Ye, Ruizhe [1 ]
机构
[1] Network Information Center, Xiamen University of Technology, Xiamen, China
[2] Xiamen University Tan Kah Kee College, Xiamen, China
[3] Engineering Research Center for Software Testing and Evaluation of Fujian Province, Xiamen, China
来源
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019年 / 11910 LNCS卷
关键词
Characteristic value - Circuit parameter - Detection technology - Experimental test - Functional changes - Hardware Trojan detection - Secret information - TensorFlow;
D O I
暂无
中图分类号
学科分类号
摘要
22
引用
收藏
页码:244 / 252
相关论文
共 50 条
  • [1] A stealthy Hardware Trojan design and corresponding detection method
    Su, Yu
    Shen, Haihua
    Lu, Renjie
    Ye, Yunying
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [2] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Zhang, Lei
    Dong, Youheng
    Wang, Jianxin
    Xiao, Chaoen
    Ding, Ding
    CHINA COMMUNICATIONS, 2019, 16 (12) : 100 - 110
  • [3] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Lei Zhang
    Youheng Dong
    Jianxin Wang
    Chaoen Xiao
    Ding Ding
    中国通信, 2019, 16 (12) : 100 - 110
  • [4] Hardware Trojan detection method based on circuit activity
    Zhao Y.
    Xie X.
    Liu Y.
    Liu A.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2018, 46 (02): : 90 - 94
  • [5] A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits
    Liu, Qiang
    Zhao, Pengyong
    Chen, Fuqiang
    IEEE ACCESS, 2019, 7 : 44632 - 44644
  • [6] A method of hardware-trojan detection using design verification techniques
    Graduate school of Engineering, Oita University, 700 Dannoharu, Oita
    870-1192, Japan
    不详
    870-1192, Japan
    Adv. Intell. Sys. Comput., (978-987):
  • [7] Hardware Trojan Detection Method Against Balanced Controllability Trigger Design
    Hsu, Wei-Ting
    Lo, Pei-Yu
    Chen, Chi-Wei
    Tien, Chin-Wei
    Kuo, Sy-Yen
    IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (02) : 178 - 181
  • [8] A Method of Hardware-Trojan Detection Using Design Verification Techniques
    Hiramoto, Yushiro
    Ohtake, Satoshi
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 978 - 987
  • [9] Hardware Trojan detection method based on combined features analysis
    Zhao Y.
    Li B.
    Ma H.
    He J.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2021, 49 (05): : 1 - 6
  • [10] Hardware Trojan Detection Based on SRC
    Sun, Chen
    Cheng, Liye
    Wang, Liwei
    Huang, Yun
    2020 35TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2020, : 472 - 475