On application of one-class SVM to reverse engineering-based hardware Trojan detection

@article{Bao2014OnAO,
  title={On application of one-class SVM to reverse engineering-based hardware Trojan detection},
  author={Chongxi Bao and Domenic J. Forte and Ankur Srivastava},
  journal={Fifteenth International Symposium on Quality Electronic Design},
  year={2014},
  pages={47-54}
}
Due to design and fabrication outsourcing to foundries, the problem of malicious modifications to integrated circuits known as hardware Trojans has attracted attention in academia as well as industry. To reduce the risks associated with Trojans, researchers have proposed different approaches to detect them. Among these approaches, test-time detection approaches have drawn the greatest attention and most approaches assume the existence of a “golden model”. Prior works suggest using reverse… CONTINUE READING
Highly Cited
This paper has 33 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 23 extracted citations

Physical Inspection & Attacks: New Frontier in Hardware Security

2018 IEEE 3rd International Verification and Security Workshop (IVSW) • 2018
View 9 Excerpts
Highly Influenced

A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) • 2018
View 2 Excerpts

Detection of Sequential Trojans in Embedded System Designs Without Scan Chains

2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) • 2018
View 2 Excerpts

Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis

IEEE Transactions on Very Large Scale Integration (VLSI) Systems • 2017
View 1 Excerpt

Single-triggered hardware Trojan identification based on gate-level circuit structural characteristics

2017 IEEE International Symposium on Circuits and Systems (ISCAS) • 2017
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 17 references

Hardware Trojan detection methodology for FPGA

2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM) • 2013
View 5 Excerpts
Highly Influenced

LIBSVM: A library for support vector machines

ACM TIST • 2011
View 3 Excerpts
Highly Influenced

The state-of-the-art in semiconductor reverse engineering

2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC) • 2011
View 4 Excerpts
Highly Influenced

Process reliability based trojans through NBTI and HCI effects

2010 NASA/ESA Conference on Adaptive Hardware and Systems • 2010
View 3 Excerpts
Highly Influenced

Trojan taxonomy

R. Karri, J. Rajendran, K. Rosenfeld
Introduction to Hardware Security and Trust, M. Tehranipoor and C. Wang, Eds. Springer New York, 2012, pp. 325–338. • 2012
View 2 Excerpts

Case study: Detecting hardware Trojans in third-party digital IP cores

2011 IEEE International Symposium on Hardware-Oriented Security and Trust • 2011
View 2 Excerpts

Similar Papers

Loading similar papers…