Hardware Trojan detection and localization based on local detectors

被引:0
作者
Bazzazi, Amin [1 ]
Manzuri Shalmani, Mohammad Taghi [2 ]
Hemmatyar, Ali Mohammad Afshin [2 ]
机构
[1] School of Science and Engineering, Sharif University of Technology, International Campus, Kish Island, Iran
[2] Department of Computer Engineering, Sharif University of Technology, Tehran, Iran
来源
Turkish Journal of Electrical Engineering and Computer Sciences | 2018年 / 26卷 / 03期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Digital integrated circuits - Malware
引用
收藏
页码:1403 / 1416
相关论文
共 50 条
[31]   Scattered Wave Jamming Detection and Localization Method Based on Differences in Multistatic SAR Images [J].
Wang, Yanbiao ;
Lou, Mingyue ;
An, Hongyang ;
Li, Zhongyu ;
Wu, Junjie ;
Yang, Jianyu .
2023 6th International Conference on Information Communication and Signal Processing, ICICSP 2023, 2023, :538-542
[32]   Obfuscated Malware Detection Using Deep Generative Model based on Global/Local Features [J].
Kim, Jin-Young ;
Cho, Sung-Bae .
Computers and Security, 2022, 112
[33]   Export methods in fault detection and localization mechanisms [J].
Université de Rennes 1-IRISA, Campus de Beaulieu, 35042 Rennes Cedex, France .
Int. J. Comput. Sci. Issues, 4 4-2 (463-471)
[34]   EXAMINATION OF REPRESENTATIVE LOCAL COMPUTER NETWORKS, THEIR ARCHITECTURAL CLASSES, AND THEIR HARDWARE INTERCONNECTING DEVICES. [J].
McCoy, E.E. ;
Carey, B.J. .
Combustion and Flame, 1980, 5 (03) :17-22
[35]   HARDWARE IMPLEMENTATION OF CAPABILITY-BASED ADDRESSING. [J].
Myers, G.J. ;
Buckingham, B.R.S. .
Operating Systems Review (ACM), 1980, 14 (04) :13-25
[36]   Accurate Detection and Localization Method of Citrus Targets in Complex Environments Based on Improved YOLO v5 [J].
Li, Li ;
Liang, Jiyuan ;
Zhang, Yunfeng ;
Zhang, Guanming ;
Chun, Changpin .
Nongye Jixie Xuebao/Transactions of the Chinese Society for Agricultural Machinery, 2024, 55 (08) :280-290
[37]   Adversarial Attacks on Transformers-Based Malware Detectors [J].
Jakhotiya, Yash ;
Patil, Heramb ;
Rawlani, Jugal ;
Mane, Sunil B. .
arXiv, 2022,
[38]   Failure Detection and Localization in the Redundant Measurement Systems. [J].
Belov, E.A. .
Trudy LPI, 1982, (388) :64-67
[39]   LiSiam: Localization Invariance Siamese Network for Deepfake Detection [J].
Wang, Jian ;
Sun, Yunlian ;
Tang, Jinhui .
IEEE Transactions on Information Forensics and Security, 2022, 17 :2425-2436
[40]   Hardware implementation of AES encryption and decryption system based on FPGA [J].
Zhu, Shihai .
Open Cybernetics and Systemics Journal, 2015, 9 (01) :1373-1377