Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








113 Hits in 6.8 sec

AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection [article]

Huili Chen, Xinqiao Zhang, Ke Huang, Farinaz Koushanfar
2022 arXiv   pre-print
We evaluate AdaTest's performance on various HT benchmarks and compare it with two prior works that use logic testing for HT detection.  ...  This paper proposes AdaTest, a novel adaptive test pattern generation framework for efficient and reliable Hardware Trojan (HT) detection.  ...  AdaTest is a generic test pattern generation framework, we plan to investigate its performance on other hardware security problems such as logic verification and built-in self-test in our future work.  ... 
arXiv:2204.06117v1 fatcat:cmoftk5du5fsrdssrmm2nfrhxm

zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge [article]

Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos
2022 IACR Cryptology ePrint Archive  
Our approach uses a specialized circuit compiler that transforms arbitrary netlists into a zero-knowledgefriendly format, and introduces a versatile Trojan detection module that maintains the privacy of  ...  To achieve this goal, in this work we employ modern cryptographic protocols for zero-knowledge proofs and enable 3PIP vendors prove an IP design is free of Trojan triggers without disclosing the corresponding  ...  The authors of [26] use an advised genetic algorithm to generate test vectors to detect Trojans based on rare nodes.  ... 
dblp:journals/iacr/MourisGT22 fatcat:rozm6xjpwbenzct6l4dbqlnqwm

A Survey on Machine Learning against Hardware Trojan Attacks: Recent Advances and Challenges

Zhao Huang, Quan Wang, Yin Chen, Xiaohong Jiang
2020 IEEE Access  
INDEX TERMS Machine learning, hardware Trojan detection, design-for-security, bus security, secure architecture. 10796 This work is licensed under a Creative Commons Attribution 4.0 License.  ...  ., HT detection, design-for-security (DFS), bus security, and secure architecture. Based on the review, we further discuss the lessons learned in and challenges arising from previous studies.  ...  HT detection is a pre-/postsilicon detection technique that is used to determine whether the hardware is contaminated by malicious logic or by an undesired functional unit [13] , [14] , [16] , [23]  ... 
doi:10.1109/access.2020.2965016 fatcat:dqh376eosnefbl4pyk6ad4sxjq

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation [article]

David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte
2022 arXiv   pre-print
One of such fields is that of hardware design; specifically the design of digital and analog integrated circuits~(ICs), where AI/ ML techniques have been extensively used to address ever-increasing design  ...  In recent years, this use has exponentially increased due to the advancement of high-performance computing and the ever increasing size of data.  ...  As shown in Table 2 , GNNs and SVMs are viable algorithms for use. Hardware Trojan Detection Rates.  ... 
arXiv:2204.09579v2 fatcat:tebjzerhfvaepbwmka7ipiccxy

Analysis of Swarm Intelligence based ANN Algorithms for Attacking PUFs

Ahmed Oun, Noor Ahmad Hazari, Mohammed Niamat
2021 IEEE Access  
In this work, Artificial Neural Networks (ANNs) using swarm intelligence-based modeling attacks are used against different silicon-based PUFs to test their resiliency to these attacks.  ...  Amongst the swarm intelligence algorithms, the Gravitational Search Algorithm (GSA), Cuckoo Search Algorithm (CS), Particle Swarm Optimizer (PSO) and the Grey Wolf Optimizer (GWO) are used.  ...  hardware-based system.  ... 
doi:10.1109/access.2021.3109235 fatcat:s2s2rej2xzc3llaxtyev4m6hmi

A NOVEL DEEP LEARNING BASED CYBER ATTACK DETECTION SYSTEM WITH BAIT BASED APPROACH FOR MITIGATION

Sangeetha Prabhu
2024 Zenodo  
A malicious effort by an individual or else organization for breaching another system's information system is termed a cyber-attack organization.  ...  The suggested method was put to the test using the Non-Dominated Sorting Genetic Algorithm Binomial Logistic Regression (NSGA2-BLR) and Non-Dominated Sorting Genetic Algorithm Multinomial Logistic Regression  ...  To maximize damage before being noticed, logic bombs are mainly used with trojan horses, worms, and viruses.  ... 
doi:10.5281/zenodo.10867501 fatcat:yutmiq3jkvdfhkkbo5vloxx4u4

HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion [article]

Yu-Zheng Lin, Muntasir Mamun, Muhtasim Alam Chowdhury, Shuyu Cai, Mingyu Zhu, Banafsheh Saber Latibari, Kevin Immanuel Gubbi, Najmeh Nazari Bavarsad, Arjun Caputo, Avesta Sasan, Houman Homayoun, Setareh Rafatirad (+2 others)
2023 arXiv   pre-print
Learning (ML) framework focusing on hardware vulnerabilities and IoT security.  ...  As the number of hardware attacks on Internet of Things (IoT) devices continues to rapidly increase, we present the Hardware Vulnerability to Weakness Mapping (HW-V2W-Map) Framework, which is a Machine  ...  , or intentional faults (in terms of hardware Trojan).  ... 
arXiv:2312.13530v1 fatcat:eh2xhp3kqrerbet6opsw25ico4

THE TRANSITION FROM INTELLIGENT TO AFFECTIVE TUTORING SYSTEM: A REVIEW AND OPEN ISSUES

Muhammad Asif Hasan, Nurul Fazmidar Mohd Noor, Siti Soraya Abdul Rahman, Mohammad Mustaneer Rahman
2020 IEEE Access  
 Machine-learning based Textual emotion can be detected using machine learning methods.  ...  [131] , three methods generally used for textual emotion recognition.  Keyword-based Keyword-based emotion detection is the most intuitive and straightforward approach.  ... 
doi:10.1109/access.2020.3036990 fatcat:po3sveb2lzb4bcqto56xgvyyeq

Intrusion detection in SCADA systems using machine learning techniques

Leandros A. Maglaras, Jianmin Jiang
2014 2014 Science and Information Conference  
For example, some studies use single learning techniques, such as neural networks, genetic algorithms, support vector machines, etc.  ...  This characteristic makes rule based algorithms incapable of detecting the intrusion.  ... 
doi:10.1109/sai.2014.6918252 fatcat:4ueepuwxezehxknf44kv4q23o4

Engineering Resilient Space Systems

John C. Day, Michel D. Ingham, Richard M. Murray, Leonard J. Reder, Brian C. Williams
2015 Insight  
Both efforts use TRN algorithm deployment.  ...  Use satisfiability (SAT) solvers instead of BDDs b. SAT solvers implement decision procedures based on propositional logic c.  ...  CASPER is designed for embedded online applications whereas ASPEN is designed for offline use. c.  ... 
doi:10.1002/inst.12006 fatcat:y5j67eywl5edlc5xj5246aqomy

Machine Learning-Based Routing and Wavelength Assignment in Software-Defined Optical Networks

Ignacio Martin, Sebastian Troia, Jose Alberto Hernandez, Alberto Rodriguez, Francesco Musumeci, Guido Maier, Rodolfo Alvizu, Oscar Gonzalez de Dios
2019 IEEE Transactions on Network and Service Management  
For instance, in [166] the authors address the Optical Regenerator Placement (ORP) problem, similar to RWA using genetic algorithms.  ...  In detail, the authors re-state the ORP problem and propose the genetic algorithm solution.  ... 
doi:10.1109/tnsm.2019.2927867 fatcat:or3lhqdqbnas3cztwkqr5ykhhq

Autonomous and autonomic systems: with applications to NASA intelligent spacecraft operations and exploration systems

2010 ChoiceReviews  
We have made liberal use of their work and their contributions to Agent-based research at NASA Goddard.  ...  Genetic Algorithms and Programming Genetic Algorithms are learning techniques based loosely on genetic reproduction and survival of the fittest.  ...  Artificial-intelligence technologies, such as genetic algorithms, neural nets, fuzzy logic, and on-board planners are candidate solutions.  ... 
doi:10.5860/choice.47-6277 fatcat:nlprjuayozhg7mp55fz2wkl4bi

A Plethoric Literature Survey on SIMBox Fraud Detection in Telecommunication Industry

Lateef Gbolahan Salaudeen, Aliyu Rufai Yauri, Garba Muhammad, Hassan Umar Suru, Alimi O. Al-Maru'f, Danlami Gabi, Suleiman Musa Argungun, Muhammad Sirajo Aliyu
2022 Direct Research Journal of Engineering and Information Technology  
By disclosing the fraud detection approaches used for its abolition and identifying their flaws. For this study, a quantitative method was used.  ...  Fraudsters effectively avoid the inter-connect toll charging points by exploiting the difference between the high interconnect rates and the low retail price for on-network calls, thereby avoiding payment of an  ...  Acknowledgements The authors acknowledge NCC for the useful information provided in the course of this research work.  ... 
doi:10.26765/drjeit14035036 fatcat:wthbftjvjngbvjdlfgqd5kuzhe

IMPLEMENTATION OF CRITICAL INFORMATION INFRASTRUCTURE PROTECTION TECHNIQUES AGAINST CYBER ATTACK.pdf [article]

TORTY VINCENT, UDOYEN PRINCE
2021 figshare.com  
The instrumentation of questionnaire was used to elicit information from the study participants. The data collected were analysed using the binary logistic regression.  ...  This gap was detected in this study to be a result of high cost of hiring expert personnel, time and large quantity of silos.  ...  The GA-based assembly (genetic algorithm) can also be used to analyze or conduct the assembly in Big Data Analytics. The R tool is used to spatially disseminate the data.  ... 
doi:10.6084/m9.figshare.14828634.v2 fatcat:g5zxndxuhje5jjccyrqxscrptm

A novel auction system for selecting advertisements in Real-Time bidding [article]

Luis Miralles-Pechuán and Fernando Jiménez and José Manuel García
2020 arXiv   pre-print
In addition, we propose a methodology based on genetic algorithms to optimize the selection of each advertiser.  ...  In this paper, we propose an alternative betting system with a new approach that not only considers the economic aspect but also other relevant factors for the functioning of the advertising system.  ...  However, this would require a better hardware and more computers working in parallel.  ... 
arXiv:2010.11981v1 fatcat:upg7tqhlbfbg7faiok2raccw7m
« Previous Showing results 1 — 15 out of 113 results