2016 8th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC) 2016
DOI: 10.1109/ihmsc.2016.65
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojan Detection Based on Cluster Analysis of Mahalanobis Distance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…Otherwise, 2DPCA can be performed to address the high-dimensional power maps converted from thermal radiation data; then DBSCAN can be exploited to detect and locate the HTs. Cui et al developed an HT detection method with the Markov distance as the clustering center [90]. The collected power-consumption is first analyzed by PCA, and then, the clustering operation is completed with the Mahalanobis distance as the class center.…”
Section: -Reverse Engineeringmentioning
confidence: 99%
See 3 more Smart Citations
“…Otherwise, 2DPCA can be performed to address the high-dimensional power maps converted from thermal radiation data; then DBSCAN can be exploited to detect and locate the HTs. Cui et al developed an HT detection method with the Markov distance as the clustering center [90]. The collected power-consumption is first analyzed by PCA, and then, the clustering operation is completed with the Mahalanobis distance as the class center.…”
Section: -Reverse Engineeringmentioning
confidence: 99%
“…This procedure can offset the requirements for golden ICs and utilize simulation-based data to represent them; however, this technique still needs golden designs as a reference. Moreover, researchers have attempted to exploit CAs to build trusted reference libraries to shift the demands for trusted ICs [71], [90], [91]. However, all the aforementioned approaches are still in the experimental simulation stage, and there is still a long way to go before practical applications are realized.…”
Section: -Implantation Preventionmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2007, D. Agrawal et al proposed the side-channel signal analysis detection method by using power, temperature and electromagnetic profiles to reflect HT effects [11]. Improving the detection precision by changing the profiles process algorithm [12,13,14,15,16,17,18,19]. In 2011, Zhang proposed an on-chip Ring Oscillator Network (RON) for HT detection as a trusted hardware design.…”
Section: Introductionmentioning
confidence: 99%