2015 IEEE 4th Global Conference on Consumer Electronics (GCCE) 2015
DOI: 10.1109/gcce.2015.7398569
|View full text |Cite
|
Sign up to set email alerts
|

Detection technique for hardware Trojans using machine learning in frequency domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 50 publications
(15 citation statements)
references
References 4 publications
0
14
0
Order By: Relevance
“…In contrast, Liu et al presented a combined PCA and SVM approach (i.e., PCA+SVM) to detect the covert communication-type Trojans by utilizing the transmission power waveform [73]. Iwase et al suggested converting the power waveform data from the time domain to the frequency domain through a discrete Fourier transform (DFT) and then conducting HT detection using SVM [87]. The PCA+SVM and DFT+SVM methods first preprocess the sample features and extract the effective part, which is more conducive to detecting and classifying HT instances.…”
Section: -Reverse Engineeringmentioning
confidence: 99%
See 2 more Smart Citations
“…In contrast, Liu et al presented a combined PCA and SVM approach (i.e., PCA+SVM) to detect the covert communication-type Trojans by utilizing the transmission power waveform [73]. Iwase et al suggested converting the power waveform data from the time domain to the frequency domain through a discrete Fourier transform (DFT) and then conducting HT detection using SVM [87]. The PCA+SVM and DFT+SVM methods first preprocess the sample features and extract the effective part, which is more conducive to detecting and classifying HT instances.…”
Section: -Reverse Engineeringmentioning
confidence: 99%
“…In addition to PCA, there are several other pretreatment techniques that have been applied to side-channel features, e.g., wavelet translation [67], 2DPCA [71], and DFT [87] (see Table 15). Moreover, Xue et al introduced a modified unsupervised correlation-based feature selection method (UCFS) and adopted it to preprocess the raw power traces of ICs [91].…”
Section: ) Dimensionality Reduction and Pretreatmentmentioning
confidence: 99%
See 1 more Smart Citation
“…To detect hardware Trojan, several side-channel signals, such as power [64,65], timing [66,67], and spatial temperature [68], have been suggested. The existence of a Trojan in an IoT object or a circuit has some impacts on its components, the most common of which are on power and gates.…”
Section: Hardware Trojan Detectionmentioning
confidence: 99%
“…The associate editor coordinating the review of this manuscript and approving it for publication was Remigiusz Wisniewski. with high efficiency in detecting the large and medium scale Trojans in FPGAs by analyzing their side channel information, e.g., Iwase et al [5] isolate the chip power signature to detect HT in the Trojan-infected FPGAs by using SVM (Support Vector Machine). The other refers to design file analyzing method which can isolate the Trojan-infected FPGAs by analyzing the characteristics of their netlist or RTL code.…”
Section: One Is Based On Physical Information Analyzing Which Ismentioning
confidence: 99%