2018
DOI: 10.1007/978-3-319-76348-4_51
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojan: Malware Detection Using Reverse Engineering and SVM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 11 publications
0
1
0
1
Order By: Relevance
“…Jain et al [ 114 ] presented an HT detection method that combines reverse engineering (RE) and SVM algorithms. This means it can avoid damage during common RE inspections.…”
Section: Hardware Trojans Protectionmentioning
confidence: 99%
“…Jain et al [ 114 ] presented an HT detection method that combines reverse engineering (RE) and SVM algorithms. This means it can avoid damage during common RE inspections.…”
Section: Hardware Trojans Protectionmentioning
confidence: 99%
“…Аналіз останніх досліджень і публікацій. Дослідження апаратних троянських програм на основі реверс-інжинірингу виконано в [3]. За його основу взято метод опорних векторів.…”
unclassified