Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/17773
Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Sengupta, Anirban | en_US |
| dc.contributor.author | Bhui, Nabendu | en_US |
| dc.date.accessioned | 2026-02-10T15:15:06Z | - |
| dc.date.available | 2026-02-10T15:15:06Z | - |
| dc.date.issued | 2026 | - |
| dc.identifier.citation | Sengupta, A., & Bhui, N. (2026). Detecting HLS Hardware Trojans using Random Forest Classifier. IEEE Design and Test. https://doi.org/10.1109/MDAT.2026.3656303 | en_US |
| dc.identifier.issn | 2168-2356 | - |
| dc.identifier.other | EID(2-s2.0-105028903336) | - |
| dc.identifier.uri | https://dx.doi.org/10.1109/MDAT.2026.3656303 | - |
| dc.identifier.uri | https://dspace.iiti.ac.in:8080/jspui/handle/123456789/17773 | - |
| dc.description.abstract | High-level Synthesis (HLS) generated IP designs are widely and effectively used in several image/video processing applications, consumer electronics applications as well as multimedia domains. However, several prior works have resolutely established major security vulnerabilities that HLS design process exposes. HLS framework/design flow can be maliciously exploited by an adversary/attacker. These vulnerabilities sanction malicious Trojan to be furtively injected during HLS design phases such as scheduling, mux-interconnect design stage, RTL datapath etc, resulting into compromised IP designs. This paper presents novel technique for detecting HLS hardware Trojans (HLS-HT) using random forest classifier based machine learning. The proposed detection framework is capable of detecting various types of state-of-the-art HLS-HT including performance degradation hardware Trojan (PD-HT), denial of service hardware Trojan (DoS-HT), battery exhaustion hardware Trojan (BE-HT), downgrade attack hardware Trojan (DA-HT), functional hardware Trojan (F-HT) and Time-bomb hardware Trojan (TB-HT). The proposed approach achieves high detection accuracy with zero false negatives for specific HLS-HTs considered here, ensuring sturdy IP design security. © 2013 IEEE. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | IEEE Computer Society | en_US |
| dc.source | IEEE Design and Test | en_US |
| dc.title | Detecting HLS Hardware Trojans using Random Forest Classifier | en_US |
| dc.type | Journal Article | en_US |
| Appears in Collections: | Department of Computer Science and Engineering | |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: