计算机技术、信息工程 |
|
|
|
|
改进边界Fisher分析近邻选择的硬件木马检测 |
王晓晗( ),王韬*( ),张阳,刘广凯 |
中国人民解放军陆军工程大学石家庄校区 装备模拟训练中心,河北 石家庄 050003 |
|
Hardware Trojan detection based on improved marginal Fisher analysis nearest neighbor selection |
Xiao-han WANG( ),Tao WANG*( ),Yang ZHANG,Guang-kai LIU |
Equipment Simulation Training Center, Army Engineering University Shijiazhuang Campus, Shijiazhuang 050003, China |
引用本文:
王晓晗,王韬,张阳,刘广凯. 改进边界Fisher分析近邻选择的硬件木马检测[J]. 浙江大学学报(工学版), 2020, 54(1): 152-159.
Xiao-han WANG,Tao WANG,Yang ZHANG,Guang-kai LIU. Hardware Trojan detection based on improved marginal Fisher analysis nearest neighbor selection. Journal of ZheJiang University (Engineering Science), 2020, 54(1): 152-159.
链接本文:
http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2020.01.018
或
http://www.zjujournals.com/eng/CN/Y2020/V54/I1/152
|
1 |
DOFE J, FREY J, YU Q. Hardware security assurance in emerging IoT applications [C]// Proceedings of IEEE International Symposium on Circuits and Systems. Montreal: IEEE, 2016: 2050-2053.
|
2 |
BHUNIA S, ABRAMOVICI M, AGRAWAL D, et al Protection against hardware Trojan attacks: towards a comprehensive solution[J]. IEEE Design Test Computer, 2013, 30 (3): 6- 17
doi: 10.1109/MDT.2012.2196252
|
3 |
WANG X, TEHRANIPOOR M, PLUSQUELLIC J, et al. Detecting malicious inclusions in secure hardware: challenges and solutions [C]// Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust. Anaheim: IEEE, 2008: 15-19.
|
4 |
WOLFF F, PAPACHRISTOU C, BHUNIA S, et al. Towards Trojan free trusted ICs: problem analysis and detection scheme [C]// Proceedings of Design, Automation and Test in Europe. Munich: IEEE, 2008: 1362-1365.
|
5 |
CHAKRABORTY R S, NARASIMHAN S, BHUNIA S, et al. Hardware Trojan: threats and emerging solutions [C]// Proceedings of IEEE International Workshop on High Level Design Validation and Test Workshop. San Francisco: IEEE, 2009: 166-171.
|
6 |
AGRAWAL D, BAKTIR S, KARAKOYUNLU D, et al. Trojan detection using IC fingerprinting [C]// Proceedings of IEEE Symposium on Security and Privacy. Berkeley: IEEE, 2007: 296-310.
|
7 |
BALASCH J, GIERLICHS B, VERBAUWHEDE I. Electromagnetic circuit fingerprints for Hardware Trojan detection [C]// Proceedings of IEEE International Symposium on Electromagnetic Compatibility. Dresden: IEEE, 2015: 246-251.
|
8 |
XIAO K, ZHANG X H, TEHRANIPOOR M A clock sweeping technique for detecting hardware trojans impacting circuits delay[J]. IEEE Design and Test of Computers, 2013, 30 (2): 26- 34
doi: 10.1109/MDAT.2013.2249555
|
9 |
NOWROZ A N, HU K, KOUSHANFAR F, et al Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2014, 33 (12): 1792- 1805
doi: 10.1109/TCAD.2014.2354293
|
10 |
STELLARI F, SONG P, WEGER A J, et al. Verification of untrusted chips using trusted layout and emission measurements [C]// Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust. Arlington: IEEE, 2014: 19-24.
|
11 |
薛明富, 王箭, 胡爱群 自适应优化的二元分类型硬件木马检测方法[J]. 计算机学报, 2018, 41 (2): 439- 451 XUE Ming-fu, WANG Jian, HU Ai-qun Adaptive optimization of two-class classification-based hardware Trojan detection method[J]. Journal of Computers, 2018, 41 (2): 439- 451
doi: 10.11897/SP.J.1016.2018.00439
|
12 |
NARASIMHAN S, WANG X, DU D, et al. TeSR: a robust temporal self-referencing approach for hardware Trojan detection [C]// Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust. San Diego: IEEE, 2011: 71-74.
|
13 |
BANGA M, MICHAEL S H. A novel sustained vector technique for the detection of hardware Trojans [C]// Proceedings of IEEE International Conference on VLSI Design. New Delhi: IEEE, 2009: 327–332.
|
14 |
张鹏, 王新成, 周庆 基于投影寻踪分析的芯片硬件木马检测[J]. 通信学报, 2013, 34 (4): 122- 126 ZHANG Peng, WANG Xin-cheng, ZHOU Qing Hardware Trojans detection based on projection pursuit[J]. Journal on Communications, 2013, 34 (4): 122- 126
|
15 |
李雄伟, 王晓晗, 张阳, 等 一种基于核最大间距准则的硬件木马检测新方法[J]. 电子学报, 2017, 45 (3): 656- 661 LI Xiong-wei, WANG Xiao-han, ZHANG Yang, et al A new hardware Trojan detection method based on kernel maximum margin criterion[J]. Acta Electronica Sinica, 2017, 45 (3): 656- 661
doi: 10.3969/j.issn.0372-2112.2017.03.023
|
16 |
赵毅强, 刘沈丰, 何家骥, 等 基于自组织竞争神经网络的硬件木马检测方法[J]. 华中科技大学学报: 自然科学版, 2016, 44 (2): 51- 55 ZHAO Yi-qiang, LIU Shen-feng, HE Jia-ji, et al Hardware Trojan detection technology based on self-organizing competition neural network[J]. Journal of Huazhong University of Science and Technology: Natural Science Edition, 2016, 44 (2): 51- 55
|
17 |
YAN S, XU D, ZHANG B, et al Graph embedding and extensions: a general framework for dimensionality reduction[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007, 29 (1): 40- 51
doi: 10.1109/TPAMI.2007.250598
|
18 |
何进荣, 丁立新, 李照奎, 等 基于边界判别投影的数据降维[J]. 软件学报, 2014, 25 (4): 826- 838 HE Jin-rong, DING Li-xin, LI Zhao-kui, et al Margin discriminant projection for dimensionality reduction[J]. Journal of Software, 2014, 25 (4): 826- 838
|
19 |
毛莎莎. 基于贪婪优化和投影变换的集成分类器算法研究[D]. 西安: 西安电子科技大学, 2014. MAO Sha-sha. A study of classifier ensemble methods based on greedy optimization and projection transformation [D]. Xi'an: Xi'an University of Electronic Science and Technology, 2014.
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|