Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors.
Syed Rafay HasanCharles A. KamhouaKevin A. KwiatLaurent NjillaPublished in: AsianHOST (2016)
Keyphrases
- mathematical model
- real time
- objective function
- prior knowledge
- experimental data
- statistical model
- low cost
- anomaly detection
- theoretical analysis
- computational model
- formal model
- steady state
- theoretical framework
- detection algorithm
- parameter estimation
- high speed
- probability distribution
- probabilistic model
- mobile robot
- computer vision