Review of machine learning based hardware Trojan detection methods

As integrated circuit (IC) design gets more complicated, outsourcing parts of the IC design and fabrication is commonly applied to simplify the production and reduce the cost. This leads to the threat of malicious manipulation to the design by the third parties involved. Such threat is considered as...

Full description

Saved in:
Bibliographic Details
Main Authors: Choo, H. S., Ooi, C. Y., Inoue, M., Ismail, N., Kok, C. H.
Format: Article
Published: Science and Technology Research Institute for Defence 2019
Subjects:
Online Access:http://eprints.utm.my/id/eprint/90740/
https://www.scopus.com/record/display.uri?eid=2-s2.0-85087061269&origin=resultslist&sort=plf-f&src=s&sid=93a358e35bd4deab3680c8e6b4844a14&sot=b&sdt=b&sl=81&s=TITLE-ABS-KEY(Review+of+machine+learning+based+hardware+trojan+detection+methods)
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first