Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis.
Xuan Thuy NgoZakaria NajmShivam BhasinSylvain GuilleyJean-Luc DangerPublished in: J. Cryptogr. Eng. (2016)
Keyphrases
- detection method
- high accuracy
- synthetic data
- cost function
- support vector machine
- real time
- preprocessing
- classification method
- dynamic programming
- decision trees
- optimization process
- hardware and software
- fully automatic
- theoretical analysis
- low cost
- experimental evaluation
- evolutionary algorithm
- pairwise
- computational cost
- detection algorithm
- clustering method
- significant improvement
- color images
- prior knowledge
- optimization method
- diffusion process