MacLeR: Machine Learning-Based Runtime Hardware Trojan Detection in Resource-Constrained IoT Edge Devices
暂无分享,去创建一个
Muhammad Shafique | Faiq Khalid | Osman Hasan | Syed Rafay Hasan | Falah Awwad | S. R. Hasan | Sara Zia | M. Shafique | O. Hasan | Faiq Khalid | F. Awwad | Sara Zia
[1] Muhammad Shafique,et al. SIMCom: Statistical sniffing of inter-module communications for runtime hardware trojan detection , 2020, Microprocess. Microsystems.
[2] Benedikt Huber,et al. Patmos: a time-predictable microprocessor , 2018, Real-Time Systems.
[3] Faiq Khalid,et al. Behavior profiling of power distribution networks for runtime hardware trojan detection , 2017, 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS).
[4] Muhammad Shafique,et al. Intelligent Security Measures for Smart Cyber Physical Systems , 2018, 2018 21st Euromicro Conference on Digital System Design (DSD).
[5] M. Tehranipoor,et al. Hardware Trojans: Lessons Learned after One Decade of Research , 2016, TODE.
[6] Muhammad Shafique,et al. Hayat: Harnessing Dark Silicon and variability for aging deceleration and balancing , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[7] Tinoosh Mohsenin,et al. Adaptive real-time Trojan detection framework through machine learning , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[8] Yu Wang,et al. Hardware Trojan Detection in Third-Party Digital Intellectual Property Cores by Multilevel Feature Analysis , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[9] Luca Benini,et al. GAP-8: A RISC-V SoC for AI at the Edge of the IoT , 2018, 2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP).
[10] Omar S. Elkeelany,et al. Self-triggering hardware trojan: Due to NBTI related aging in 3-D ICs , 2017, Integr..
[11] Ankur Srivastava,et al. On application of one-class SVM to reverse engineering-based hardware Trojan detection , 2014, Fifteenth International Symposium on Quality Electronic Design.
[12] Wei He,et al. Supervised and unsupervised machine learning for side-channel based Trojan detection , 2016, 2016 IEEE 27th International Conference on Application-specific Systems, Architectures and Processors (ASAP).
[13] Sylvain Guilley,et al. Hardware Trojan detection by delay and electromagnetic measurements , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[14] Hong Zhao,et al. Applying chaos theory for runtime Hardware Trojan detection , 2015, 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).
[15] Sri Parameswaran,et al. TrojanGuard: Simple and effective hardware Trojan mitigation techniques for Pipelined MPSoCs , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).
[16] Melanie Hartmann,et al. Design Of Analog Cmos Integrated Circuits , 2016 .
[17] Axel Jantsch,et al. TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint , 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[18] Qiang Liu,et al. A survey of hardware Trojan threat and defense , 2016, Integr..
[19] N Mohankumar,et al. Delay-Based Reference Free Hardware Trojan Detection Using Virtual Intelligence , 2018 .
[20] Osman Hasan,et al. Hardware Trojan detection in soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline , 2014, 2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS).
[21] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[22] Benjamin Carrión Schäfer,et al. Trust Filter: Runtime Hardware Trojan Detection in Behavioral MPSoCs , 2017, J. Hardw. Syst. Secur..
[23] Mark Mohammad Tehranipoor,et al. Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution , 2013, IEEE Design & Test.
[24] Josep Torrellas,et al. Facelift: Hiding and slowing down aging in multicores , 2008, 2008 41st IEEE/ACM International Symposium on Microarchitecture.
[25] Muhammad Shafique,et al. dTune: Leveraging reliable code generation for adaptive dependability tuning under process variation and aging-induced effects , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[26] Hu He,et al. R2D2: Runtime reassurance and detection of A2 Trojan , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[27] Krishnendu Chakrabarty,et al. Machine Learning for Hardware Security: Opportunities and Risks , 2018, Journal of Electronic Testing.
[28] Ankur Srivastava,et al. On Reverse Engineering-Based Hardware Trojan Detection , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[29] Osman Hasan,et al. Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.
[30] Michael Hutter,et al. EM-based detection of hardware trojans on FPGAs , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[31] Faiq Khalid,et al. A self-learning framework to detect the intruded integrated circuits , 2016, 2016 IEEE International Symposium on Circuits and Systems (ISCAS).
[32] Omar S. Elkeelany,et al. Hardware trojans in 3-D ICs due to NBTI effects and countermeasure , 2017, Integr..
[33] Muhammad Shafique,et al. A Roadmap Toward the Resilient Internet of Things for Cyber-Physical Systems , 2018, IEEE Access.
[34] Franziska Hoffmann,et al. Design Of Analog Cmos Integrated Circuits , 2016 .
[35] Yiqiang Zhao,et al. Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[36] Yier Jin,et al. On-Chip Analog Trojan Detection Framework for Microprocessor Trustworthiness , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[37] Faiq Khalid,et al. Runtime hardware Trojan monitors through modeling burst mode communication using formal verification , 2018, Integr..
[38] Ramesh Karri,et al. Hardware Trojan Detection Using the Order of Path Delay , 2018, ACM J. Emerg. Technol. Comput. Syst..
[39] Corporate. SPARC architecture manual - version 8 , 1992 .
[40] N. Mohankumar,et al. Wire Load Variation-Based Hardware Trojan Detection Using Machine Learning Techniques , 2019 .
[41] Xiaohong Jiang,et al. A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges , 2020, IEEE Access.