A Hardware Trojan Detection Method Design Based on TensorFlow

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As an extra circuit inserted into chip design, Hardware Trojan can achieve malicious functional changes, reliability reduction or secret information disclosure. Meanwhile, the design of the hardware Trojan circuit is concealed, triggered only under rare conditions, and is in a waiting state for most of the life cycle. It is quite small compared to the host design and has little influence on circuit parameters. Therefore, it is difficult to detect hardware Trojans. Fast and accurate detection technology is provided by Google’s open source machine learning framework TensorFlow. The hardware Trojan circuit adopts the standard circuit provided by Trust-Hub. It is realized through FPGA programming. ISE is used for compiling and simulation to obtain the characteristic value of the circuit; Finally, a hardware Trojan detection platform based on machine learning is established by simulating the data via TensorFlow machine learning. The experimental test results verify the correctness of the design and provide a simple hardware Trojan detection for IC.

Cite

CITATION STYLE

APA

Wu, W., Wei, Y., & Ye, R. (2019). A Hardware Trojan Detection Method Design Based on TensorFlow. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11910 LNCS, pp. 244–252). Springer. https://doi.org/10.1007/978-3-030-34139-8_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free