A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection
[article]
2022
arXiv
pre-print
We evaluate AdaTest's performance on various HT benchmarks and compare it with two prior works that use logic testing for HT detection. ...
This paper proposes AdaTest, a novel adaptive test pattern generation framework for efficient and reliable Hardware Trojan (HT) detection. ...
AdaTest is a generic test pattern generation framework, we plan to investigate its performance on other hardware security problems such as logic verification and built-in self-test in our future work. ...
arXiv:2204.06117v1
fatcat:cmoftk5du5fsrdssrmm2nfrhxm
zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge
[article]
2022
IACR Cryptology ePrint Archive
Our approach uses a specialized circuit compiler that transforms arbitrary netlists into a zero-knowledgefriendly format, and introduces a versatile Trojan detection module that maintains the privacy of ...
To achieve this goal, in this work we employ modern cryptographic protocols for zero-knowledge proofs and enable 3PIP vendors prove an IP design is free of Trojan triggers without disclosing the corresponding ...
The authors of [26] use an advised genetic algorithm to generate test vectors to detect Trojans based on rare nodes. ...
dblp:journals/iacr/MourisGT22
fatcat:rozm6xjpwbenzct6l4dbqlnqwm
A Survey on Machine Learning against Hardware Trojan Attacks: Recent Advances and Challenges
2020
IEEE Access
INDEX TERMS Machine learning, hardware Trojan detection, design-for-security, bus security, secure architecture. 10796 This work is licensed under a Creative Commons Attribution 4.0 License. ...
., HT detection, design-for-security (DFS), bus security, and secure architecture. Based on the review, we further discuss the lessons learned in and challenges arising from previous studies. ...
HT detection is a pre-/postsilicon detection technique that is used to determine whether the hardware is contaminated by malicious logic or by an undesired functional unit [13] , [14] , [16] , [23] ...
doi:10.1109/access.2020.2965016
fatcat:dqh376eosnefbl4pyk6ad4sxjq
A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
[article]
2022
arXiv
pre-print
One of such fields is that of hardware design; specifically the design of digital and analog integrated circuits~(ICs), where AI/ ML techniques have been extensively used to address ever-increasing design ...
In recent years, this use has exponentially increased due to the advancement of high-performance computing and the ever increasing size of data. ...
As shown in Table 2 , GNNs and SVMs are viable algorithms for use. Hardware Trojan Detection Rates. ...
arXiv:2204.09579v2
fatcat:tebjzerhfvaepbwmka7ipiccxy
Analysis of Swarm Intelligence based ANN Algorithms for Attacking PUFs
2021
IEEE Access
In this work, Artificial Neural Networks (ANNs) using swarm intelligence-based modeling attacks are used against different silicon-based PUFs to test their resiliency to these attacks. ...
Amongst the swarm intelligence algorithms, the Gravitational Search Algorithm (GSA), Cuckoo Search Algorithm (CS), Particle Swarm Optimizer (PSO) and the Grey Wolf Optimizer (GWO) are used. ...
hardware-based system. ...
doi:10.1109/access.2021.3109235
fatcat:s2s2rej2xzc3llaxtyev4m6hmi
A NOVEL DEEP LEARNING BASED CYBER ATTACK DETECTION SYSTEM WITH BAIT BASED APPROACH FOR MITIGATION
2024
Zenodo
A malicious effort by an individual or else organization for breaching another system's information system is termed a cyber-attack organization. ...
The suggested method was put to the test using the Non-Dominated Sorting Genetic Algorithm Binomial Logistic Regression (NSGA2-BLR) and Non-Dominated Sorting Genetic Algorithm Multinomial Logistic Regression ...
To maximize damage before being noticed, logic bombs are mainly used with trojan horses, worms, and viruses. ...
doi:10.5281/zenodo.10867501
fatcat:yutmiq3jkvdfhkkbo5vloxx4u4
HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion
[article]
2023
arXiv
pre-print
Learning (ML) framework focusing on hardware vulnerabilities and IoT security. ...
As the number of hardware attacks on Internet of Things (IoT) devices continues to rapidly increase, we present the Hardware Vulnerability to Weakness Mapping (HW-V2W-Map) Framework, which is a Machine ...
, or intentional faults (in terms of hardware Trojan). ...
arXiv:2312.13530v1
fatcat:eh2xhp3kqrerbet6opsw25ico4
THE TRANSITION FROM INTELLIGENT TO AFFECTIVE TUTORING SYSTEM: A REVIEW AND OPEN ISSUES
2020
IEEE Access
Machine-learning based Textual emotion can be detected using machine learning methods. ...
[131] , three methods generally used for textual emotion recognition.
Keyword-based Keyword-based emotion detection is the most intuitive and straightforward approach. ...
doi:10.1109/access.2020.3036990
fatcat:po3sveb2lzb4bcqto56xgvyyeq
Intrusion detection in SCADA systems using machine learning techniques
2014
2014 Science and Information Conference
For example, some studies use single learning techniques, such as neural networks, genetic algorithms, support vector machines, etc. ...
This characteristic makes rule based algorithms incapable of detecting the intrusion. ...
doi:10.1109/sai.2014.6918252
fatcat:4ueepuwxezehxknf44kv4q23o4
Engineering Resilient Space Systems
2015
Insight
Both efforts use TRN algorithm deployment. ...
Use satisfiability (SAT) solvers instead of BDDs b. SAT solvers implement decision procedures based on propositional logic c. ...
CASPER is designed for embedded online applications whereas ASPEN is designed for offline use. c. ...
doi:10.1002/inst.12006
fatcat:y5j67eywl5edlc5xj5246aqomy
Machine Learning-Based Routing and Wavelength Assignment in Software-Defined Optical Networks
2019
IEEE Transactions on Network and Service Management
For instance, in [166] the authors address the Optical Regenerator Placement (ORP) problem, similar to RWA using genetic algorithms. ...
In detail, the authors re-state the ORP problem and propose the genetic algorithm solution. ...
doi:10.1109/tnsm.2019.2927867
fatcat:or3lhqdqbnas3cztwkqr5ykhhq
Autonomous and autonomic systems: with applications to NASA intelligent spacecraft operations and exploration systems
2010
ChoiceReviews
We have made liberal use of their work and their contributions to Agent-based research at NASA Goddard. ...
Genetic Algorithms and Programming Genetic Algorithms are learning techniques based loosely on genetic reproduction and survival of the fittest. ...
Artificial-intelligence technologies, such as genetic algorithms, neural nets, fuzzy logic, and on-board planners are candidate solutions. ...
doi:10.5860/choice.47-6277
fatcat:nlprjuayozhg7mp55fz2wkl4bi
A Plethoric Literature Survey on SIMBox Fraud Detection in Telecommunication Industry
2022
Direct Research Journal of Engineering and Information Technology
By disclosing the fraud detection approaches used for its abolition and identifying their flaws. For this study, a quantitative method was used. ...
Fraudsters effectively avoid the inter-connect toll charging points by exploiting the difference between the high interconnect rates and the low retail price for on-network calls, thereby avoiding payment of an ...
Acknowledgements The authors acknowledge NCC for the useful information provided in the course of this research work. ...
doi:10.26765/drjeit14035036
fatcat:wthbftjvjngbvjdlfgqd5kuzhe
IMPLEMENTATION OF CRITICAL INFORMATION INFRASTRUCTURE PROTECTION TECHNIQUES AGAINST CYBER ATTACK.pdf
[article]
2021
figshare.com
The instrumentation of questionnaire was used to elicit information from the study participants. The data collected were analysed using the binary logistic regression. ...
This gap was detected in this study to be a result of high cost of hiring expert personnel, time and large quantity of silos. ...
The GA-based assembly (genetic algorithm) can also be used to analyze or conduct the assembly in Big Data Analytics. The R tool is used to spatially disseminate the data. ...
doi:10.6084/m9.figshare.14828634.v2
fatcat:g5zxndxuhje5jjccyrqxscrptm
A novel auction system for selecting advertisements in Real-Time bidding
[article]
2020
arXiv
pre-print
In addition, we propose a methodology based on genetic algorithms to optimize the selection of each advertiser. ...
In this paper, we propose an alternative betting system with a new approach that not only considers the economic aspect but also other relevant factors for the functioning of the advertising system. ...
However, this would require a better hardware and more computers working in parallel. ...
arXiv:2010.11981v1
fatcat:upg7tqhlbfbg7faiok2raccw7m
« Previous
Showing results 1 — 15 out of 113 results