Hardware Trojan Detection Based on Circuit Sequence Features with GRU Neural Network

被引:0
|
作者
Li, Zhenghao [1 ]
Zhang, Yang [1 ]
Hu, Xing [1 ]
Li, Shaoqing [1 ]
Liang, Bin [1 ]
机构
[1] Key Laboratory of Advanced Microprocessor Chips and Systems National University of Defense Technology, Changsha, China
来源
Proceedings - IEEE Symposium on Computers and Communications | 2024年
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Computer viruses - Recurrent neural networks
引用
收藏
相关论文
共 20 条
  • [1] Hardware Trojan Detection using Graph Neural Networks
    Yasaei, Rozhin
    Chen, Luke
    Yu, Shih-Yuan
    Faruque, Mohammad Abdullah Al
    IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2024, : 1 - 1
  • [2] Hardware Trojan Detection for Gate-Level Netlists Based on Multidimensional Features
    Li, Linyuan
    Xu, Jinfu
    Yan, Yingjian
    Zhao, Conghui
    Liu, Yanjiang
    Computer Engineering and Applications, 2023, 59 (18) : 278 - 284
  • [3] CRC-Based Hardware Trojan Detection for Improved Hardware Security
    Mohankumar, N.
    Jayakumar, M.
    Nirmala Devi, M.
    Lecture Notes in Electrical Engineering, 2018, 471 : 381 - 389
  • [4] On Reverse Engineering-Based Hardware Trojan Detection
    Department of Electrical and Computer Engineering, University of Maryland, College Park
    MD
    20742, United States
    不详
    FL
    32611, United States
    IEEE Trans Comput Aided Des Integr Circuits Syst, 1 (49-57):
  • [5] Hardware Trojan Detection at LUT: Where Structural Features Meet Behavioral Characteristics
    Wu, Lingjuan
    Zhang, Xuelin
    Wang, Siyi
    Hu, Wei
    Proceedings of the 2022 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2022, 2022, : 121 - 124
  • [6] A Hardware Trojan Trigger Localization Method in RTL based on Control Flow Features
    Huang, Hao
    Shen, Haihua
    Li, Shan
    Li, Huawei
    Proceedings of the Asian Test Symposium, 2022, 2022-November : 138 - 143
  • [7] A New Hardware Trojan Detection Method Based on Kernel Maximum Margin Criterion
    Department of Information Engineering, Ordnance Engineering College, Shijiazhuang
    Hebei
    050003, China
    Tien Tzu Hsueh Pao, 1600, 3 (656-661):
  • [8] A general framework of trojan communication detection based on network traces
    Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
    不详
    不详
    Proc. - IEEE Int. Conf. Networking, Archit. Storage, NAS, (49-58):
  • [9] R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training
    Hasegawa, Kento
    Hidano, Seira
    Nozawa, Kohei
    Kiyomoto, Shinsaku
    Togawa, Nozomu
    arXiv, 2022,
  • [10] Based on the network connection LAN Trojan detection system design and implementation
    School of Economics, Yunnan University, China
    不详
    Adv. Mater. Res., (514-518):