2017
DOI: 10.1587/transfun.e100.a.1427
|View full text |Cite
|
Sign up to set email alerts
|

A Hardware-Trojan Classification Method Using Machine Learning at Gate-Level Netlists Based on Trojan Features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(29 citation statements)
references
References 16 publications
0
29
0
Order By: Relevance
“…On the other hand, n features extracted from each net can be utilized to differentiate Trojan-infected nets from normal nets. For example, Kasegawa et al extracted five HT-net feature values from each net in gate-level netlists and learned them using a classifier such as SVM or ANNs [59]. After that, the trained classifier can be used to classify a set of features from an unknown gate-level netlist.…”
Section: -Reverse Engineeringmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, n features extracted from each net can be utilized to differentiate Trojan-infected nets from normal nets. For example, Kasegawa et al extracted five HT-net feature values from each net in gate-level netlists and learned them using a classifier such as SVM or ANNs [59]. After that, the trained classifier can be used to classify a set of features from an unknown gate-level netlist.…”
Section: -Reverse Engineeringmentioning
confidence: 99%
“…On the other hand, ML algorithms, especially supervised or unsupervised learning-based approaches, can be selected according to whether the training datasets are available. For example, the works of [59], [61], [73], and [86], among others, selected a classification-based approach for HT detection because they assumed that golden designs or ICs are available as training datasets (see Table 15).…”
Section: ) Reasonable Selection Of the Learning Modelsmentioning
confidence: 99%
“…Hasegawa et al [28] Dong et al [10] came up with a framework called RG-Secure. They used the lightGBM algorithm to detect gatelevel netlists from Trust-HUB [31].…”
Section: B Gate-level Netlists Detection Based On Machine Learningmentioning
confidence: 99%
“…Experimental results of existing machine-learningbased hardware-Trojan detection methods So far, some existing machine-learning hardware-Trojan detection methods are as follows: support vector machine (SVM)-based hardware-Trojan detection method, 22 neural network (NN)-based hardware-Trojan detection method, 23 random forest (RF)-based hardware-Trojan detection method, 24 and multi-layer neural network (MNN)-based hardware-Trojan detection method. 25 The true positive rate (TPR) and the true negative rate (TNR) are used by Hasegawa et al 22 and Inoue et al 26 to evaluate the detection results.…”
Section: Hardware-trojan Detection Process For Gate-level Netlistmentioning
confidence: 99%