A Method of Hardware-Trojan Detection Using Design Verification Techniques.
Yushiro HiramotoSatoshi OhtakePublished in: CISIS (2018)
Keyphrases
- detection method
- significant improvement
- real time
- clustering method
- pairwise
- experimental evaluation
- detection algorithm
- segmentation method
- high precision
- objective function
- synthetic data
- low cost
- computer systems
- support vector machine svm
- feature extraction
- classification method
- hardware design
- circuit design
- detection rate
- high accuracy
- probabilistic model
- prior knowledge
- similarity measure
- case study
- image processing
- genetic algorithm