Facilitating side channel analysis by obfuscation for Hardware Trojan detection.
Arash NejatDavid HélyVincent BeroullePublished in: IDT (2015)
Keyphrases
- detection method
- automatic detection
- detection accuracy
- object detection
- low cost
- false alarms
- malware detection
- detection algorithm
- detection rate
- reverse engineering
- computing power
- detection scheme
- hardware implementation
- database
- false positives
- computer systems
- case study
- data transformation
- parallel hardware
- embedded systems
- static analysis
- computing systems
- anomaly detection
- data sets