Application of LSTM Auto Encoder in Hardware Trojan Detection

被引:0
|
作者
Sumarsono, Alex [1 ]
Masters, Zachary [2 ]
机构
[1] California State University, East Bay, Department of Computer Engineering, Hayward,CA, United States
[2] Marvell Semiconductor, Inc., Santa Clara,CA, United States
来源
2023 IEEE 13th Annual Computing and Communication Workshop and Conference, CCWC 2023 | 2023年
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Hardware security - Integrated circuits - Learning systems - Long short-term memory - Malware - Signal encoding - Timing circuits
引用
收藏
页码:566 / 571
相关论文
共 50 条
  • [31] Data Augmentation for Machine Learning-Based Hardware Trojan Detection at Gate-Level Netlists
    Hasegawa, Kento
    Hidano, Seira
    Nozawa, Kohei
    Kiyomoto, Shinsaku
    Togawa, Nozomu
    Proceedings - 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design, IOLTS 2021, 2021,
  • [32] Trojan Detection in Large Language Models: Insights from The Trojan Detection Challenge
    Maloyan, Narek
    Verma, Ekansh
    Nutfullin, Bulat
    Ashinov, Bislan
    arXiv,
  • [33] TrojanSAINT: Gate-Level Netlist Sampling-Based Inductive Learning for Hardware Trojan Detection
    Lashen, Hazem
    Alrahis, Lilas
    Knechtel, Johann
    Sinanoglu, Ozgur
    Proceedings - IEEE International Symposium on Circuits and Systems, 2023, 2023-May
  • [34] Hardware Trojan Horse device based on unintended USB channels
    Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ON, Canada
    NSS - Netw. Syst. Secur., 1600, (1-8):
  • [35] Crosstalk-Based Hardware Trojan In Low Power Designs
    Barkhausen Institut, Dresden, Germany
    Proc. - Int. SoC Des. Conf. , ISOCC, (51-52):
  • [36] A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts
    Hepp, Alexander
    Perez, Tiago
    Pagliarini, Samuel
    Sigl, Georg
    arXiv, 2022,
  • [37] Deton: Defeating Hardware Trojan Horses in Microprocessors Through Software Obfuscation
    Cassano, Luca
    Iamundo, Mattia
    Lopez, Tomas Antonio
    Nazzari, Alessandro
    Natale, Giorgio Di
    SSRN, 2022,
  • [38] A Hardware Trojan Trigger Localization Method in RTL based on Control Flow Features
    Huang, Hao
    Shen, Haihua
    Li, Shan
    Li, Huawei
    Proceedings of the Asian Test Symposium, 2022, 2022-November : 138 - 143
  • [39] HIDING IN PLAIN SIGHT: REFRAMING HARDWARE TROJAN BENCHMARKING AS A HIDE&SEEK MODIFICATION
    Sarihi, Amin
    Patooghy, Ahmad
    Jamieson, Peter
    Badawy, Abdel-Hameed A.
    arXiv,
  • [40] Non-Destructive Hardware Trojan Circuit Screening by Backside Near Infrared Imaging
    Sakamoto, Junichi
    Sakane, Hirofumi
    Hori, Yohei
    Kawamura, Shinichi
    Hayashi, Yuichi
    Nagata, Makoto
    2023 IEEE Physical Assurance and Inspection of Electronics, PAINE 2023, 2023,