Cargando…
A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection
The Cyber-Physical System and even the Metaverse will become the second space in which human beings live. While bringing convenience to human beings, it also brings many security threats. These threats may come from software or hardware. There has been a lot of research on managing malware, and ther...
Autores principales: | Dong, Chen, Yao, Yinan, Xu, Yi, Liu, Ximeng, Wang, Yan, Zhang, Hao, Xu, Li |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302022/ https://www.ncbi.nlm.nih.gov/pubmed/37420671 http://dx.doi.org/10.3390/s23125503 |
Ejemplares similares
-
Hardware Trojans in Chips: A Survey for Detection and Prevention
por: Dong, Chen, et al.
Publicado: (2020) -
Integrated circuit authentication: hardware Trojans and counterfeit detection
por: Tehranipoor, Mohammad, et al.
Publicado: (2013) -
Trusted digital circuits: hardware trojan vulnerabilities, prevention and detection
por: Salmani, Hassan
Publicado: (2018) -
The hardware trojan war: attacks, myths, and defenses
por: Bhunia, Swarup, et al.
Publicado: (2017) -
System-level protection and hardware Trojan detection using weighted voting()
por: Amin, Hany A.M., et al.
Publicado: (2014)