Zhao et al., 2018 - Google Patents
Applying chaos theory for runtime hardware Trojan monitoring and detectionZhao et al., 2018
- Document ID
- 4556012198250909765
- Author
- Zhao H
- Kwiat L
- Kwiat K
- Kamhoua C
- Njilla L
- Publication year
- Publication venue
- IEEE Transactions on Dependable and Secure Computing
External Links
Snippet
Hardware Trojans (HTs) pose a serious threat to the security of Integrated Circuits (ICs). Detecting HTs in an IC is an important but difficult problem due to the wide spectrum of HTs and their stealthy nature. While researchers have been working on enhancing traditional IC …
- 238000001514 detection method 0 title abstract description 59
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3185—Reconfiguring for testing, e.g. LSSD, partitioning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/556—Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/22—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
- G06F11/26—Functional testing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Huang et al. | A survey on machine learning against hardware trojan attacks: Recent advances and challenges | |
Hu et al. | An overview of hardware security and trust: Threats, countermeasures, and design tools | |
Shafique et al. | Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead | |
Liu et al. | Two sides of the same coin: Boons and banes of machine learning in hardware security | |
Lee et al. | Robust hardware trojan detection method by unsupervised learning of electromagnetic signals | |
Duan et al. | Machine learning in hardware security | |
Alrahis et al. | UNSAIL: Thwarting oracle-less machine learning attacks on logic locking | |
Zhao et al. | Applying chaos theory for runtime hardware Trojan monitoring and detection | |
US9886583B2 (en) | Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for computer-based systems | |
ES2628820T3 (en) | use of power fingerprint (pfp) to monitor the integrity and enhance the security of computer systems | |
Tehranipoor et al. | A survey of hardware trojan taxonomy and detection | |
Wang et al. | Comprehensive evaluation of machine learning countermeasures for detecting microarchitectural side-channel attacks | |
Wang et al. | Enabling micro AI for securing edge devices at hardware level | |
Sethumadhavan et al. | Trustworthy hardware from untrusted components | |
Wang et al. | Hybrid-shield: Accurate and efficient cross-layer countermeasure for run-time detection and mitigation of cache-based side-channel attacks | |
Arıkan et al. | Processor security: Detecting microarchitectural attacks via count-min sketches | |
Kuruvila et al. | Defending hardware-based malware detectors against adversarial attacks | |
Konigsmark et al. | System-of-PUFs: Multilevel security for embedded systems | |
Zhang et al. | Analyzing cache side channels using deep neural networks | |
Sayadi et al. | Towards ai-enabled hardware security: Challenges and opportunities | |
Zhao et al. | Applying chaos theory for runtime hardware Trojan detection | |
Bhade et al. | Lightweight hardware-based cache side-channel attack detection for edge devices (edge-cascade) | |
Batina et al. | On implementation-level security of edge-based machine learning models | |
Lou et al. | Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels | |
Kadiyala et al. | Lambda: Lightweight assessment of malware for embedded architectures |