Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer
- 1 July 2022
- journal article
- research article
- Published by Elsevier BV in Journal of Systems Architecture
Abstract
No abstract availableKeywords
Funding Information
- Agencia Estatal de Investigación (P2018/TCS-4496)
This publication has 39 references indexed in Scilit:
- AVFSMPublished by Association for Computing Machinery (ACM) ,2016
- Hardware Trojans hidden in RTL don't cares — Automated insertion and prevention methodologiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- FIDES: Enhancing trust in reconfigurable based hardware systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- VeriTrust: Verification for Hardware TrustIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015
- Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege EscalationIEEE Transactions on Emerging Topics in Computing, 2013
- Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral levelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Exposing vulnerabilities of untrusted computing platformsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Bil: A tool-chain for bitstream reverse-engineeringPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- A Survey of Hardware Trojan Taxonomy and DetectionIEEE Design & Test of Computers, 2010
- A Coefficient of Agreement for Nominal ScalesEducational and Psychological Measurement, 1960