[go: up one dir, main page]

Zhao et al., 2018 - Google Patents

Applying chaos theory for runtime hardware Trojan monitoring and detection

Zhao et al., 2018

Document ID
4556012198250909765
Author
Zhao H
Kwiat L
Kwiat K
Kamhoua C
Njilla L
Publication year
Publication venue
IEEE Transactions on Dependable and Secure Computing

External Links

Snippet

Hardware Trojans (HTs) pose a serious threat to the security of Integrated Circuits (ICs). Detecting HTs in an IC is an important but difficult problem due to the wide spectrum of HTs and their stealthy nature. While researchers have been working on enhancing traditional IC …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3185Reconfiguring for testing, e.g. LSSD, partitioning
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/26Functional testing

Similar Documents

Publication Publication Date Title
Huang et al. A survey on machine learning against hardware trojan attacks: Recent advances and challenges
Hu et al. An overview of hardware security and trust: Threats, countermeasures, and design tools
Shafique et al. Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead
Liu et al. Two sides of the same coin: Boons and banes of machine learning in hardware security
Lee et al. Robust hardware trojan detection method by unsupervised learning of electromagnetic signals
Duan et al. Machine learning in hardware security
Alrahis et al. UNSAIL: Thwarting oracle-less machine learning attacks on logic locking
Zhao et al. Applying chaos theory for runtime hardware Trojan monitoring and detection
US9886583B2 (en) Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for computer-based systems
ES2628820T3 (en) use of power fingerprint (pfp) to monitor the integrity and enhance the security of computer systems
Tehranipoor et al. A survey of hardware trojan taxonomy and detection
Wang et al. Comprehensive evaluation of machine learning countermeasures for detecting microarchitectural side-channel attacks
Wang et al. Enabling micro AI for securing edge devices at hardware level
Sethumadhavan et al. Trustworthy hardware from untrusted components
Wang et al. Hybrid-shield: Accurate and efficient cross-layer countermeasure for run-time detection and mitigation of cache-based side-channel attacks
Arıkan et al. Processor security: Detecting microarchitectural attacks via count-min sketches
Kuruvila et al. Defending hardware-based malware detectors against adversarial attacks
Konigsmark et al. System-of-PUFs: Multilevel security for embedded systems
Zhang et al. Analyzing cache side channels using deep neural networks
Sayadi et al. Towards ai-enabled hardware security: Challenges and opportunities
Zhao et al. Applying chaos theory for runtime hardware Trojan detection
Bhade et al. Lightweight hardware-based cache side-channel attack detection for edge devices (edge-cascade)
Batina et al. On implementation-level security of edge-based machine learning models
Lou et al. Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels
Kadiyala et al. Lambda: Lightweight assessment of malware for embedded architectures