2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI) 2016
DOI: 10.1109/cci.2016.7778952
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojan detection based on ELM neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…There exist a body of prior art solutions that use machine learning to remedy the impact of noise in the power/current profile of side-channel analysis [30] [31] [32]. Authors in [30] use the Extreme Learning Machine algorithm to detect HT by analyzing the power consumption and observing the resulting current portfolio as an input feature to their machine learning solution. The major limitation in this work is the size of detectable Trojans.…”
Section: Previous Work On Hw Trojan Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…There exist a body of prior art solutions that use machine learning to remedy the impact of noise in the power/current profile of side-channel analysis [30] [31] [32]. Authors in [30] use the Extreme Learning Machine algorithm to detect HT by analyzing the power consumption and observing the resulting current portfolio as an input feature to their machine learning solution. The major limitation in this work is the size of detectable Trojans.…”
Section: Previous Work On Hw Trojan Detectionmentioning
confidence: 99%
“…AVATAR provides several advantages compare to sidechannel power detection solutions including [30] [31] [32]. 1) It doesn't require access to a Golden IC for Trojan detection.…”
Section: Previous Work On Hw Trojan Detectionmentioning
confidence: 99%
“…BPNNs can adjust the network weights and thresholds during training to achieve a nonlinear mapping of the input and output as well as better generalization ability. -Extreme Learning Machine (ELM) [68] is a singlehidden-layer feed-forward ANN (SLFN) that can randomly initialize the input weight and bias and obtain the corresponding output weight. ELM has been widely used in many fields due to its high learning speed and good generalization ability.…”
Section: ) Supervised Learningmentioning
confidence: 99%
“…Some researchers have attempted to apply ANNs to sidechannel analysis. For example, Wang et al presented an HT detection method to indicate whether the ICs are Trojaninfected by sampling and classifying the current features using an ELM [68]. Li et al extracted the nonlinear features from the power-consumption through the HT detection model established by the BPNN [66], [67].…”
Section: -Reverse Engineeringmentioning
confidence: 99%
See 1 more Smart Citation