Fifteenth International Symposium on Quality Electronic Design 2014
DOI: 10.1109/isqed.2014.6783305
|View full text |Cite
|
Sign up to set email alerts
|

On application of one-class SVM to reverse engineering-based hardware Trojan detection

Abstract: Due to design and fabrication outsourcing to foundries, the problem of malicious modifications to integrated circuits known as hardware Trojans has attracted attention in academia as well as industry. To reduce the risks associated with Trojans, researchers have proposed different approaches to detect them. Among these approaches, test-time detection approaches have drawn the greatest attention and most approaches assume the existence of a "golden model". Prior works suggest using reverse-engineering to identi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
45
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 114 publications
(45 citation statements)
references
References 15 publications
0
45
0
Order By: Relevance
“…We will propose in this paper a design-time strategy which increases the design's sensitivity to our previously proposed reverse engineering based Trojan detection approach [1]. It obtains the layout images through RE, breaks this layout into non-overlapping grids and uses the layout obtained via RE together with a golden layout (which is assumed to be with the designer since they have control over the design) to extract several features.…”
Section: B Reverse-engineering Based Hardware Trojan Detectionmentioning
confidence: 99%
See 4 more Smart Citations
“…We will propose in this paper a design-time strategy which increases the design's sensitivity to our previously proposed reverse engineering based Trojan detection approach [1]. It obtains the layout images through RE, breaks this layout into non-overlapping grids and uses the layout obtained via RE together with a golden layout (which is assumed to be with the designer since they have control over the design) to extract several features.…”
Section: B Reverse-engineering Based Hardware Trojan Detectionmentioning
confidence: 99%
“…We are interested in finding any design-time strategies that can make detection of Trojans easier using [1]. As a motivating example, we choose one benchmark, s298, from ISCAS89 [2].…”
Section: Problem Definition and Challengesmentioning
confidence: 99%
See 3 more Smart Citations