Deceptive Logic Locking for Hardware Integrity Protection Against Machine Learning Attacks.
Dominik SisejkovicFarhad MerchantLennart M. ReimannRainer LeupersPublished in: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. (2022)
Keyphrases
- machine learning
- digital circuits
- low cost
- hardware and software
- database systems
- real time
- machine learning methods
- decision trees
- information extraction
- artificial intelligence
- machine learning algorithms
- trusted computing
- concurrency control
- integrity constraints
- logic programming
- computing systems
- countermeasures
- pattern recognition
- image processing
- feature selection
- learning algorithm
- data mining
- embedded systems
- chip design
- inductive logic programming
- knowledge acquisition
- text classification
- support vector machine
- knowledge representation
- database management systems
- watermarking scheme
- text mining
- natural language processing
- network anomaly detection