Exploiting hardware obfuscation methods to prevent and detect hardware Trojans.
Qiaoyan YuJaya DofeZhiming ZhangPublished in: MWSCAS (2017)
Keyphrases
- significant improvement
- computing systems
- hardware and software
- low cost
- computer systems
- data sets
- hardware implementation
- embedded systems
- preprocessing
- hardware architecture
- computing power
- anomaly detection
- case study
- clustering algorithm
- image processing
- learning algorithm
- information retrieval
- machine learning