Detecting Rtl Trojans Using Artificial Immune Systems And High Level Behavior Classification


Download Detecting Rtl Trojans Using Artificial Immune Systems And High Level Behavior Classification PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Detecting Rtl Trojans Using Artificial Immune Systems And High Level Behavior Classification book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Detecting RTL Trojans Using Artificial Immune Systems and High Level Behavior Classification


Detecting RTL Trojans Using Artificial Immune Systems and High Level Behavior Classification

Author: Farhath Zareen

language: en

Publisher:

Release Date: 2019


DOWNLOAD





Security assurance in a computer system can be viewed as distinguishing between self and non-self. Artificial Immune Systems (AIS) are a class of machine learning (ML) techniques inspired by the behavior of innate biological immune systems, which have evolved to accurately classify self-behavior from non-self-behavior. This work aims to leverage AIS-based ML techniques for identifying certain behavioral traits in high level hardware descriptions, including unsafe or undesirable behaviors, whether such behavior exists due to human error during development or due to intentional, malicious circuit modifications, known as hardware Trojans, without the need fora golden reference model. We explore the use of Negative Selection and Clonal Selection Algorithms, which have historically been applied to malware detection on software binaries, to detect potentially unsafe or malicious behavior in hardware. We present a software tool which analyzes Trojan-inserted benchmarks, extracts their control and data-flow graphs (CDFGs), and uses this to train an AIS behavior model, against which new hardware descriptions may be tested.

Behavioral Synthesis for Hardware Security


Behavioral Synthesis for Hardware Security

Author: Srinivas Katkoori

language: en

Publisher: Springer Nature

Release Date: 2022-02-08


DOWNLOAD





This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking. Provides a single-source reference to behavioral synthesis for hardware security; Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations; Includes behavioral synthesis techniques for intellectual property protection.

Index to Scientific Reviews


Index to Scientific Reviews

Author:

language: en

Publisher:

Release Date: 1974*


DOWNLOAD





Semiannual. "An international interdisciplinary index to the review literature of science, medicine, agriculture, technology, and the behavioral sciences". Includes literature appearing in about 75 full coverage source journals, articles with 40 or more references, and marked review references in Science citation index data base. SCI format, with citation, source, permuterm, corporate, patent, and anonymous indexes; also journal lists.