Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks.
Dominik SisejkovicFarhad MerchantLennart M. ReimannRainer LeupersPublished in: CoRR (2021)
Keyphrases
- machine learning
- digital circuits
- hardware and software
- low cost
- pattern recognition
- chip design
- machine learning algorithms
- logic programming
- knowledge acquisition
- trusted computing
- countermeasures
- concurrency control
- machine learning methods
- real time
- support vector machine
- computer science
- data analysis
- embedded systems
- feature selection
- data mining
- text mining
- network anomaly detection
- learning algorithm
- artificial intelligence
- classical logic
- mental states
- image processing
- inductive logic programming
- database systems
- computer systems
- information extraction