A Review: The Beauty of Serendipity Between Integrated Circuit Security and Artificial Intelligence
Abstract
1. Introduction
- Reviewing the design and manufacturing process of ICs and discussing the security risks encountered in these processes.
- Summarizing the attack characteristics and destructiveness of HTs and introducing the design principles and details of information leakage, denial of service, degraded performance, and function change HTs.
- Comparing the AI-based HT detection technologies, describing the details of different approaches during detection, listing the features used in the detection process.
- Illustrating the challenges and difficulties faced by current AI-based technologies in the field of ICs security and outlining the open issues that need to be addressed in future research.
2. Background
2.1. Preliminary Concepts
2.2. Origin and Evolution
2.3. Circuit Scale and Integration
2.4. Design and Manufacturing Flow
2.4.1. Design Stage
2.4.2. Manufacturing Stage
2.4.3. Packaging and Testing Stage
3. Integrated Circuit Security Risks
3.1. Source of Security Threats
3.1.1. Untrustworthy Third-Party IP Suppliers
3.1.2. Untrustworthy Design Companies
3.1.3. Untrustworthy Original Equipment Manufacturers
3.1.4. Untrustworthy Material Suppliers
3.1.5. Untrustworthy EDA Tool Suppliers
3.2. Attack Approaches for ICs
3.2.1. Side-Channel Attack
3.2.2. Fault Injection Attack
3.2.3. Reverse Engineering
3.2.4. Hardware Trojan Attack
3.2.5. Other Attacks
4. Learn About Hardware Trojans
4.1. Definition of Hardware Trojan
4.2. Working Principle and Structure
4.2.1. Combinational and Sequential HTs
4.2.2. Digital and Analog HTs
4.3. Hardware Trojans on Special Chips
4.3.1. AMS/RF
4.3.2. Biochip
4.3.3. AI Chip
4.3.4. Quantum Chip
5. Hardware Trojan Attack Model
5.1. Leak Information
5.2. Denial of Service
5.3. Degrade Performance
5.4. Change Functionality
6. Defense Strategies Based on Traditional Machine Learning
6.1. SVM-Based
6.2. RF-Based
6.3. PCA-Based
6.4. KNN-Based
6.5. K-Means-Based
7. Defense Strategies Based on Advanced Machine Learning
7.1. Neural-Networks-Based
7.1.1. MNN-Based
7.1.2. CNN-Based
7.1.3. TextCNN-Based
7.1.4. ANN-Based
7.1.5. ELM-Based
7.1.6. MLP-Based
7.1.7. LSTM-Based
7.1.8. GNN-Based
7.2. Reinforcement-Learning-Based
7.3. Ensemble-Learning-Based
7.4. Transfer-Learning-Based
8. Challenges and Future Work
8.1. In-Depth Exploration of HTs Themselves
8.1.1. Locating the HTs
8.1.2. Recognizing the Behavior of HTs
8.2. Combination of Artificial Intelligence
8.2.1. Scarce Dataset
8.2.2. Adversarial Examples
8.3. Security Strategies Involving in the Entire Life Cycle
8.3.1. AI-Based Static-Dynamic HTs Detection
8.3.2. AI-Based Security Strategy of Global Supply Chain
9. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Stratigopoulos, H.G.; Makris, Y. Error moderation in low-cost machine-learning-based analog/rf testing. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2008, 27, 339–351. [Google Scholar] [CrossRef]
- Bardeen, J.; Brattain, W.H. The transistor, a semi-conductor triode. Phys. Rev. 1948, 74, 230. [Google Scholar] [CrossRef]
- Kilby, J.S.C. Invention of the integrated circuit. IEEE Trans. Electron Devices 1976, 23, 648–654. [Google Scholar] [CrossRef]
- Berlin, L. The Man Behind the Microchip: Robert Noyce and the Invention of Silicon Valley; Oxford University Press: Oxford, UK, 2005. [Google Scholar]
- Schaller, R.R. Moore’s law: Past, present and future. IEEE Spectr. 1997, 34, 52–59. [Google Scholar] [CrossRef]
- Wang, Y.W.; Zheng, M.Z. Invention and technological progresses of integrated circuits. In Handbook of Integrated Circuit Industry; Springer: Berlin/Heidelberg, Germany, 2023; pp. 3–23. [Google Scholar]
- Welch, B.M.; Shen, Y.D.; Zucca, R.; Eden, R.C.; Long, S.I. Lsi processing technology for planar gaas integrated circuits. IEEE Trans. Electron Devices 1980, 27, 1116–1124. [Google Scholar] [CrossRef]
- Chinese Academy of Cyberspace Studies. World information technology development. In World Internet Development Report 2022: Blue Book for World Internet Conference; Springer: Berlin/Heidelberg, Germany, 2023; pp. 83–108. [Google Scholar]
- Gilbert, M.J. Chern networks: Reconciling fundamental physics and device engineering. Nat. Commun. 2025, 16, 3904. [Google Scholar] [CrossRef]
- Peddie, J. Compute accelerators and other gpus. In The History of the GPU-New Developments; Springer: Berlin/Heidelberg, Germany, 2023; pp. 239–304. [Google Scholar]
- Salmani, H. The global integrated circuit supply chain flow and the hardware trojan attack. In Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection; Springer International Publishing: Cham, Switzerland, 2018; pp. 1–11. [Google Scholar]
- Börger, E. Architecture Design and Validation Methods; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
- Dally, W.J.; Harting, R.C.; Aamodt, T.M. Digital Design Using VHDL: A Systems Approach; Cambridge University Press: Cambridge, UK, 2015. [Google Scholar]
- Greaves, D.J. System on chip design and modelling. In University of Cambridge Computer Laboratory Lecture Notes; University of Cambridge: Cambridge, UK, 2011; 130p. [Google Scholar]
- Singh, R.; Colombo, L.; Schuegraf, K.; Doering, R.; Diebold, A. Semiconductor manufacturing. In Guide to State-of-the-Art Electron Devices; Wiley-IEEE Press: Piscataway, NJ, USA, 2013; pp. 121–132. [Google Scholar]
- Greig, W. Integrated Circuit Packaging, Assembly and Interconnections; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
- Grout, I.A. Integrated Circuit Test Engineering: Modern Techniques; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2005. [Google Scholar]
- Pennisi, S. The integrated circuit industry at a crossroads: Threats and opportunities. Chips 2022, 1, 150–171. [Google Scholar] [CrossRef]
- Knechtel, J.; Kavun, E.B.; Regazzoni, F.; Heuser, A.; Chattopadhyay, A.; Mukhopadhyay, D.; Dey, S.; Fei, Y.; Belenky, Y.; Levi, I.; et al. Towards secure composition of integrated circuits and electronic systems: On the role of eda. In Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE’20), Grenoble, France, 9–13 March 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 508–513. [Google Scholar]
- Türksönmez, H.; Özcanhan, M.H. A survey on integrated circuit trojans. Comput. Eng. Intell. Syst. 2021, 12, 1–8. [Google Scholar] [CrossRef]
- Dong, C.; He, G.; Liu, X.; Yang, Y.; Guo, W. A multi-layer hardware trojan protection framework for iot chips. IEEE Access 2019, 7, 23628–23639. [Google Scholar] [CrossRef]
- Rostami, M.; Koushanfar, F.; Rajendran, J.; Karri, R. Hardware security: Threat models and metrics. In Proceedings of the 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD’13), San Jose, CA, USA, 18–21 November 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 819–823. [Google Scholar]
- Guin, U.; Huang, K.; DiMase, D.; Carulli, J.M.; Tehranipoor, M.; Makris, Y. Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain. Proc. IEEE 2014, 102, 1207–1228. [Google Scholar] [CrossRef]
- Bloom, G.; Narahari, B.; Simha, R. Fab forensics: Increasing trust in ic fabrication. In Proceedings of the 2010 IEEE International Conference on Technologies for Homeland Security (HST’10), Waltham, MA, USA, 8–10 November 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 99–105. [Google Scholar]
- Vemuri, S.; Chen, S. Split Manufacturing of Integrated Circuits for Hardware Security and Trust; Springer Nature: Cham, Switzerland, 2021. [Google Scholar]
- Méndez Real, M.; Salvador, R. Physical side-channel attacks on embedded neural networks: A survey. Appl. Sci. 2021, 11, 6790. [Google Scholar] [CrossRef]
- Eslami, M.; Ghavami, B.; Raji, M.; Mahani, A. A survey on fault injection methods of digital integrated circuits. Integration 2020, 71, 154–163. [Google Scholar] [CrossRef]
- Boneh, D.; DeMillo, R.A.; Lipton, R.J. On the importance of checking cryptographic protocols for faults. In International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’97); Springer: Berlin/Heidelberg, Germany, 1997; pp. 37–51. [Google Scholar]
- Torrance, R.; James, D. The state-of-the-art in semiconductor reverse engineering. In Proceedings of the 48th Design Automation Conference, San Diego, CA, USA, 5–10 June 2011; pp. 333–338. [Google Scholar]
- Bhasin, S.; Danger, J.L.; Guilley, S.; Ngo, X.T.; Sauvage, L. Hardware trojan horses in cryptographic ip cores. In Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, 20 August 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 15–29. [Google Scholar]
- Bao, C.; Forte, D.; Srivastava, A. On application of one-class svm to reverse engineering-based hardware trojan detection. In Proceedings of the Fifteenth International Symposium on Quality Electronic Design, Santa Clara, CA, USA, 3–5 March 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 47–54. [Google Scholar]
- Dong, C.; Zhang, F.; Liu, X.; Huang, X.; Guo, W.; Yang, Y. A locating method for multi-purposes hts based on the boundary network. IEEE Access 2019, 7, 110936–110950. [Google Scholar] [CrossRef]
- Agrawal, D.; Baktir, S.; Karakoyunlu, D.; Rohatgi, P.; Sunar, B. Trojan detection using ic fingerprinting. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, CA, USA, 20–23 May 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 296–310. [Google Scholar]
- Dong, C.; Xu, Y.; Liu, X.; Zhang, F.; He, G.; Chen, Y. Hardware trojans in chips: A survey for detection and prevention. Sensors 2020, 20, 5165. [Google Scholar] [CrossRef]
- Belous, A.; Saladukha, V. Viruses, Hardware and Software Trojans: Attacks and Countermeasures; Springer Nature: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
- Mburu, S.M.; Nyamwange, A.K. Blockbackdoor. In Proceedings of the 4th Annual International Conference, Kabarak University, Nakuru, Kenya, 15–18 July 2014; Kabarak University: Nakuru, Kenya, 2014. [Google Scholar]
- Tan, B.; Garg, S.; Karri, R.; Liu, Y.; Zuzak, M.; Chakraborty, A.; Srivastava, A.; Aramoon, O.; Xu, Q.; Qu, G.; et al. Independent verification and validation of security-aware eda tools and ip. In Proceedings of the 2021 58th ACM/IEEE Design Automation Conference (DAC’21), San Francisco, CA, USA, 5–9 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1299–1302. [Google Scholar]
- Tehranipoor, M.; Koushanfar, F. A survey of hardware trojan taxonomy and detection. IEEE Des. Test Comput. 2010, 27, 10–25. [Google Scholar] [CrossRef]
- Shi, Z.; Ma, H.; Zhang, Q.; Liu, Y.; Zhao, Y.; He, J. Test generation for hardware trojan detection using correlation analysis and genetic algorithm. ACM Trans. Embed. Comput. Syst. (TECS) 2021, 20, 1–20. [Google Scholar] [CrossRef]
- Xiao, K.; Forte, D.; Jin, Y.; Karri, R.; Bhunia, S.; Tehranipoor, M. Hardware trojans: Lessons learned after one decade of research. ACM Trans. Des. Autom. Electron. Syst. (TODAES) 2016, 22, 1–23. [Google Scholar] [CrossRef]
- Khan, M.N.I.; Nagarajan, K.; Ghosh, S. Hardware trojans in emerging non-volatile memories. In Proceedings of the 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE’19), Florence, Italy, 25–29 March 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 396–401. [Google Scholar]
- Banga, M.; Hsiao, M.S. A region based approach for the identification of hardware trojans. In Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, USA, 9 June 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 40–47. [Google Scholar]
- Bhunia, S.; Hsiao, M.S.; Banga, M.; Narasimhan, S. Hardware trojan attacks: Threat analysis and countermeasures. Proc. IEEE 2014, 102, 1229–1247. [Google Scholar] [CrossRef]
- Ferreira, P.M.; Petit, H.; Naviner, J.F. Ams and rf design for reliability methodology. In Proceedings of the 2010 IEEE International Symposium on Circuits and Systems (ISCAS’10), Paris, France, 30 May–2 June 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 3657–3660. [Google Scholar]
- Dong, C.; Liu, X.; Xu, Y.; Lian, S. Security and innovation protection of biochips. In Handbook of Biochips: Integrated Circuits and Systems for Biology and Medicine; Springer: Berlin/Heidelberg, Germany, 2022; pp. 927–947. [Google Scholar]
- Li, B.; Gu, J.; Jiang, W. Artificial intelligence (ai) chip technology review. In Proceedings of the 2019 International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI’19), Taiyuan, China, 8–10 November 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 114–117. [Google Scholar]
- Ghoshal, S.; Mitra, D.; Roy, S.; Majumder, D.D. Biosensors and biochips for nanomedical applications: A review. Sens. Transducers 2010, 113, 1. [Google Scholar]
- Xu, X.; Zhang, J. Rethinking fpga security in the new era of artificial intelligence. In Proceedings of the 2020 21st International Symposium on Quality Electronic Design (ISQED’20), Santa Clara, CA, USA, 25–26 March 2020; IEEE: Piscataway, NJ, USA; pp. 46–51. [Google Scholar]
- He, G.; Dong, C.; Huang, X.; Guo, W.; Liu, X.; Ho, T.Y. Htcatcher: Finite state machine and feature verifcation for large-scale neuromorphic computing systems. In Proceedings of the 2020 on Great Lakes Symposium on VLSI (GLSVLSI’20), Virtual Event China, 7–9 September 2020; pp. 415–420. [Google Scholar]
- Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photonics 2020, 12, 1012–1236. [Google Scholar] [CrossRef]
- Roy, D.B.; Fritzmann, T.; Sigl, G. Efficient hardware/software co-design for post-quantum crypto algorithm sike on arm and risc-v based microcontrollers. In Proceedings of the 39th International Conference on Computer-Aided Design (ICCAD’20), Virtual Event USA, 2–5 November 2020; pp. 1–9. [Google Scholar]
- Hepp, A.; Sigl, G. Tapeout of a risc-v crypto chip with hardware trojans: A case-study on trojan design and pre-silicon detectability. In Proceedings of the 18th ACM International Conference on Computing Frontiers (CF’21), Virtual Event Italy, 11–13 May 2021; pp. 213–220. [Google Scholar]
- Salmani, H.; Tehranipoor, M.; Karri, R. On design vulnerability analysis and trust benchmarks development. In Proceedings of the 2013 IEEE 31st International Conference on Computer Design (ICCD’13), Asheville, NC, USA, 6–9 October 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 471–474. [Google Scholar]
- Shakya, B.; He, T.; Salmani, H.; Forte, D.; Bhunia, S.; Tehranipoor, M. Benchmarking of hardware trojans and maliciously affected circuits. J. Hardw. Syst. Secur. 2017, 1, 85–102. [Google Scholar] [CrossRef]
- Fern, N.; Kulkarni, S.; Cheng, K.T.T. Hardware trojans hidden in rtl don’t cares—Automated insertion and prevention methodologies. In Proceedings of the 2015 IEEE International Test Conference (ITC’15), Anaheim, CA, USA, 6–8 October 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–8. [Google Scholar]
- Chang, D.; Bakkaloglu, B.; Ozev, S. Enabling unauthorized rf transmission below noise floor with no detectable impact on primary communication performance. In Proceedings of the 2015 IEEE 33rd VLSI Test Symposium (VTS’15), Napa, CA, USA, 27–29 April 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–4. [Google Scholar]
- Fern, N.; San, I.; Koç, C.K.; Cheng, K.T. Hardware trojans in incompletely specified on-chip bus systems. In Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE’16), Dresden, Germany, 14–18 March 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 527–530. [Google Scholar]
- De, A.; Khan, M.N.I.; Nagarajan, K.; Ghosh, S. Hartbleed: Using hardware trojans for data leakage exploits. IEEE Trans. Very Large Scale Integr. VLSI Syst. 2020, 28, 968–979. [Google Scholar] [CrossRef]
- Islam, M.N.; Kundu, S. Pmu-trojan: On exploiting power management side channel for information leakage. In Proceedings of the 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC’18), Jeju, Republic of Korea, 22–25 January 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 709–714. [Google Scholar]
- Becker, G.T.; Regazzoni, F.; Paar, C.; Burleson, W.P. Stealthy dopant-level hardware trojans. In Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International Workshop, Santa Barbara, CA, USA, 20–23 August 20213; Springer: Berlin/Heidelberg, Germany, 2013; pp. 197–214. [Google Scholar]
- Boraten, T.; Kodi, A.K. Mitigation of denial of service attack with hardware trojans in noc architectures. In Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS’16), Chicago, IL, USA, 23–27 May 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1091–1100. [Google Scholar]
- Elshamy, M.; Di Natale, G.; Sayed, A.; Pavlidis, A.; Louërat, M.M.; Aboushady, H.; Stratigopoulos, H.G. Digital-to-analog hardware trojan attacks. IEEE Trans. Circuits Syst. I Regul. Pap. TCASI 2021, 69, 573–586. [Google Scholar] [CrossRef]
- Mal-Sarkar, S.; Krishna, A.; Ghosh, A.; Bhunia, S. Hardware trojan attacks in fpga devices: Threat analysis and effective counter measures. In Proceedings of the 24th on Great Lakes Symposium on VLSI (GLSVLSI’14), Houston, TX, USA, 21–23 May 2014; pp. 287–292. [Google Scholar]
- Hasegawa, K.; Oya, M.; Yanagisawa, M.; Togawa, N. Hardware trojans classification for gate-level netlists based on machine learning. In Proceedings of the 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS’16), Sant Feliu de Guixols, Spain, 4–6 July 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 203–206. [Google Scholar]
- Vashistha, N.; Lu, H.; Shi, Q.; Woodard, D.L.; Asadizanjani, N.; Tehranipoor, M.M. Detecting hardware trojans using combined self-testing and imaging. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. TCAD 2021, 41, 1730–1743. [Google Scholar] [CrossRef]
- Hu, T.; Wu, L.; Zhang, X.; Yin, Y.; Yang, Y. Hardware trojan detection combine with machine learning: An svm-based detection approach. In Proceedings of the 2019 IEEE 13th International Conference on Anti-Counterfeiting, Security, and Identification (ASID’19), Xiamen, China, 25–27 October 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 202–206. [Google Scholar]
- Kulkarni, A.; Pino, Y.; Mohsenin, T. Svm-based real-time hardware trojan detection for many-core platform. In Proceedings of the 2016 17th International Symposium on Quality Electronic Design (ISQED’16), Santa Clara, CA, USA, 15–16 March 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 362–367. [Google Scholar]
- Pan, Z.; Mishra, P. Hardware trojan detection using shapley ensemble boosting. In Proceedings of the 28th Asia and South Pacific Design Automation Conference (ASP-DAC’23), Tokyo, Japan, 16–19 January 2023; pp. 496–503. [Google Scholar]
- Negishi, R.; Kurihara, T.; Togawa, N. Hardware-trojan detection at gate-level netlists using gradient boosting decision tree models. In Proceedings of the 2022 IEEE 12th International Conference on Consumer Electronics (ICCE’22), Berlin, Germany, 2–6 September 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–6. [Google Scholar]
- Hasegawa, K.; Yanagisawa, M.; Togawa, N. Trojan-feature extraction at gate-level netlists and its application to hardware-trojan detection using random forest classifier. In Proceedings of the 2017 IEEE International Symposium on Circuits and Systems (ISCAS’17), Baltimore, MD, USA, 28–31 May 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–4. [Google Scholar]
- Kurihara, T.; Togawa, N. Hardware-trojan classification based on the structure of trigger circuits utilizing random forests. In Proceedings of the 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS’21), Torino, Italy, 28–30 June 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–4. [Google Scholar]
- Lodhi, F.K.; Hasan, S.R.; Hasan, O.; Awwadl, F. Power profiling of microcontroller’s instruction set for runtime hardware trojans detection without golden circuit models. In Proceedings of the 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE’17), Lausanne, Switzerland, 27–31 March 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 294–297. [Google Scholar]
- Xiang, Y.; Li, L.; Zhou, W. Random forest classifier for hardware trojan detection. In Proceedings of the 2019 12th International Symposium on Computational Intelligence and Design (ISCID’19), Hangzhou, China, 14–15 December 2019; IEEE: Piscataway, NJ, USA, 2019; Volume 1, pp. 134–137. [Google Scholar]
- Dong, C.; Liu, Y.; Chen, J.; Liu, X.; Guo, W.; Chen, Y. An unsupervised detection approach for hardware trojans. IEEE Access 2020, 8, 158169–158183. [Google Scholar] [CrossRef]
- Huang, J.; Yang, D.; Gao, C.; Fu, C. A pca and mahalanobis distance-based detection method for logical hardware trojan. Concurr. Comput. Pract. Exp. 2019, 31, e4724. [Google Scholar] [CrossRef]
- Hu, K.; Nowroz, A.N.; Reda, S.; Koushanfar, F. High-sensitivity hardware trojan detection using multimodal characterization. In Proceedings of the 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE’13), Grenoble, France, 18–22 March 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 1271–1276. [Google Scholar]
- Nowroz, A.N.; Hu, K.; Koushanfar, F.; Reda, S. Novel techniques for high-sensitivity hardware trojan detection using thermal and power maps. IEEE Trans. -Comput.-Aided Des. Integr. Circuits Syst. TCAD 2014, 33, 1792–1805. [Google Scholar] [CrossRef]
- Yan, M.; Wei, H.; Onabajo, M. On-chip thermal profiling to detect malicious activity: System-level concepts and design of key building blocks. IEEE Trans. Very Large Scale Integr. VLSI Syst. 2021, 29, 530–543. [Google Scholar] [CrossRef]
- Seum, A.; Chowdhury, M.R.Z.; Hossain, F.S. An efficient machine learning approach for hardware trojan detection. In Proceedings of the 2022 25th International Conference on Computer and Information Technology (ICCIT’22), Cox’s Bazar, Bangladesh, 17–19 December 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 182–187. [Google Scholar]
- Mohanraj, P.; Paramasivam, S. A multiobjective approach for side-channel based hardware trojan detection using power traces. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2024, 107, 825–835. [Google Scholar] [CrossRef]
- Yang, X.; Sang, Q.; Wang, C.; Yu, M.; Zhao, Y. Development and challenges of reliability modeling from transistors to circuits. IEEE J. Electron Devices Soc. 2023, 11, 179–189. [Google Scholar] [CrossRef]
- Salmani, H. Cotd: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans. Inf. Forensics Secur. TIFS 2016, 12, 338–350. [Google Scholar] [CrossRef]
- Salmani, H. Gradual-n-justification (gnj) to reduce false-positive hardware trojan detection in gate-level netlist. IEEE Trans. Very Large Scale Integr. VLSI Syst. 2022, 30, 515–525. [Google Scholar] [CrossRef]
- Bao, C.; Forte, D.; Srivastava, A. On reverse engineering-based hardware trojan detection. IEEE Trans. -Comput.-Aided Des. Integr. Circuits Syst. TCAD 2015, 35, 49–57. [Google Scholar] [CrossRef]
- Nguyen, L.N.; Yilmaz, B.B.; Prvulovic, M.; Zajic, A. A novel golden-chip-free clustering technique using backscattering side channel for hardware trojan detection. In Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST’20), San Jose, CA, USA, 7–11 December 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–12. [Google Scholar]
- Jakkula, V. Tutorial on Support Vector Machine (SVM); Technical Report; School of Electrical Engineering and Computer Science, Washington State University: Pullman, WA, USA, 2006; Available online: https://course.khoury.northeastern.edu/cs5100f11/resources/jakkula.pdf (accessed on 17 June 2025).
- Pan, Z.; Sheldon, J.; Mishra, P. Test generation using reinforcement learning for delay-based side-channel analysis. In Proceedings of the 39th International Conference on Computer-Aided Design (ICCAD’20), Virtual Event USA, 2–5 November 2020; pp. 1–7. [Google Scholar]
- Hasegawa, K.; Yanagisawa, M.; Togawa, N. Hardware trojans classification for gate-level netlists using multi-layer neural networks. In Proceedings of the 2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS’17), Thessaloniki, Greece, 3–5 July 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 227–232. [Google Scholar]
- Hasegawa, K.; Hidano, S.; Nozawa, K.; Kiyomoto, S.; Togawa, N. R-htdetector: Robust hardware-trojan detection based on adversarial training. IEEE Trans. Comput. (TC) 2022, 72, 333–345. [Google Scholar] [CrossRef]
- Sharma, R.; Rathor, V.S.; Sharma, G.K.; Pattanaik, M. A new hardware trojan detection technique using deep convolutional neural network. Integration 2021, 79, 1–11. [Google Scholar] [CrossRef]
- Yu, S.; Gu, C.; Liu, W.; O’Neill, M. Deep learning-based hardware trojan detection with block-based netlist information extraction. IEEE Trans. Emerg. Top. Comput. 2021, 10, 1837–1853. [Google Scholar] [CrossRef]
- Xu, Y.; Chen, Z.; Huang, B.; Liu, X.; Dong, C. Httext: A textcnn-based pre-silicon detection for hardware trojans. In Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom’21), New York City, NY, USA, 30 September–3 October 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 55–62. [Google Scholar]
- Dong, C.; Yao, Y.; Xu, Y.; Liu, X.; Wang, Y.; Zhang, H.; Xu, L. A cost-driven method for deep-learning-based hardware trojan detection. Sensors 2023, 23, 5503. [Google Scholar] [CrossRef]
- Wang, K.; Zheng, H.; Louri, A. Tsa-noc: Learning-based threat detection and mitigation for secure network-on-chip architecture. IEEE Micro 2020, 40, 56–63. [Google Scholar] [CrossRef]
- Wang, S.; Dong, X.; Sun, K.; Cui, Q.; Li, D.; He, C. Hardware trojan detection based on elm neural network. In Proceedings of the 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI’16), Wuhan, China, 13–15 October 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 400–403. [Google Scholar]
- Zhang, T.; Rahman, M.L.; Kamali, H.M.; Azar, K.Z.; Farahmandi, F. Sipguard: Run-time system-in-package security monitoring via power noise variation. IEEE Trans. Very Large Scale Integr. VLSI Syst. 2023, 32, 305–318. [Google Scholar] [CrossRef]
- Khalid, F.; Hasan, S.R.; Zia, S.; Hasan, O.; Awwad, F.; Shafique, M. Macler: Machine learning-based runtime hardware trojan detection in resource-constrained iot edge devices. IEEE Trans.-Comput.-Aided Des. Integr. Circuits Syst. TCAD 2020, 39, 3748–3761. [Google Scholar] [CrossRef]
- Lu, R.; Shen, H.; Su, Y.; Li, H.; Li, X. Gramsdet: Hardware trojan detection based on recurrent neural network. In Proceedings of the 2019 IEEE 28th Asian Test Symposium (ATS’19), Kolkata, India, 10–13 December 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 111–1115. [Google Scholar]
- Pan, Z.; Mishra, P. Td-zero: Automatic golden-free hardware trojan detection using zero-shot learning. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. (TCAD) 2024, 43, 1998–2011. [Google Scholar] [CrossRef]
- Yasaei, R.; Yu, S.Y.; Naeini, E.K.; Al Faruque, M.A. Gnn4ip: Graph neural network for hardware intellectual property piracy detection. In Proceedings of the 2021 58th ACM/IEEE Design Automation Conference (DAC’21), San Francisco, CA, USA, 5–9 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 217–222. [Google Scholar]
- Yasaei, R.; Yu, S.Y.; Al Faruque, M.A. Gnn4tj: Graph neural networks for hardware trojan detection at register transfer level. In Proceedings of the 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE’21), Grenoble, France, 1–5 February 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1504–1509. [Google Scholar]
- Cheng, D.; Dong, C.; He, W.; Chen, Z.; Xu, Y. Gnn4gate: A bi-directional graph neural network for gate-level hardware trojan detection. In Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE’22), Antwerp, Belgium, 14–23 March 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1315–1320. [Google Scholar]
- Cheng, D.; Dong, C.; He, W.; Chen, Z.; Liu, X.; Zhang, H. A fine-grained detection method for gate-level hardware trojan base on bidirectional graph neural networks. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 101822. [Google Scholar] [CrossRef]
- Chen, L.; Dong, C.; Wu, Q.; Liu, X.; Guo, X.; Chen, Z.; Zhang, H.; Yang, Y. Gnn4ht: A two-stage gnn based approach for hardware trojan multifunctional classification. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. TCAD 2024, 44, 172–185. [Google Scholar] [CrossRef]
- Pan, Z.; Mishra, P. Automated test generation for hardware trojan detection using reinforcement learning. In Proceedings of the 26th Asia and South Pacific Design Automation Conference (ASP-DAC’21), Tokyo, Japan, 18–21 January 2021; pp. 408–413. [Google Scholar]
- Chen, H.; Zhang, X.; Huang, K.; Koushanfar, F. Adatest: Reinforcement learning and adaptive sampling for on-chip hardware trojan detection. ACM Trans. Embed. Comput. Syst. (TECS) 2023, 22, 1–23. [Google Scholar] [CrossRef]
- Sharma, R.; Valivati, N.K.; Sharma, G.K.; Pattanaik, M. A new hardware trojan detection technique using class weighted xgboost classifier. In Proceedings of the 2020 24th International Symposium on VLSI Design and Test (VDAT’20), Bhubaneswar, India, 23–25 July 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar]
- Dong, C.; Chen, J.; Guo, W.; Zou, J. A machine-learning-based hardware-trojan detection approach for chips in the internet of things. Int. J. Distrib. Sens. Netw. 2019, 15, 1550147719888098. [Google Scholar] [CrossRef]
- Faezi, S.; Yasaei, R.; Al Faruque, M.A. Htnet: Transfer learning for golden chip-free hardware trojan detection. In Proceedings of the 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE’21), Grenoble, France, 1–5 February 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1484–1489. [Google Scholar]
- Sun, S.; Zhang, H.; Cui, X.; Dong, L.; Fang, X. Electromagnetic side-channel hardware trojan detection based on transfer learning. IEEE Trans. Circuits Syst. II Express Briefs 2021, 69, 1742–1746. [Google Scholar] [CrossRef]
- Wen, Y.; Yu, W. Combining thermal maps with inception neural networks for hardware trojan detection. IEEE Embed. Syst. Lett. 2020, 13, 45–48. [Google Scholar] [CrossRef]
- Hasegawa, K.; Hidano, S.; Nozawa, K.; Kiyomoto, S.; Togawa, N. Data augmentation for machine learning-based hardware trojan detection at gate-level netlists. In Proceedings of the 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS’21), Torino, Italy, 28–30 June 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–4. [Google Scholar]
- Srinivas, C.G.P.; Balachander, S.; Samant, Y.C.S.; Hariharan, B.V.; Devi, M.N. Hardware trojan detection using xgboost algorithm for iot with data augmentation using ctgan and smote. In Ubiquitous Communications and Network Computing: 4th EAI International Conference, UBICNET 2021, Virtual Event, March 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 116–127. [Google Scholar]
- Tang, W.; Su, J.; Gao, Y. Hardware trojan detection method based on dual discriminator assisted conditional generation adversarial network. J. Electron.-Test.-Theory Appl. JETTA 2023, 39, 129–140. [Google Scholar] [CrossRef]
- Sarihi, A.; Patooghy, A.; Jamieson, P.; Badawy, A.H.A. Trojan playground: A reinforcement learning framework for hardware trojan insertion and detection. J. Supercomput. TJSC 2024, 80, 14295–14329. [Google Scholar] [CrossRef]
- Nozawa, K.; Hasegawa, K.; Hidano, S.; Kiyomoto, S.; Hashimoto, K.; Togawa, N. Generating adversarial examples for hardware-trojan detection at gate-level netlists. J. Inf. Process. 2021, 29, 236–246. [Google Scholar] [CrossRef]
Term | Abbreviation |
---|---|
Integrated Circuit | IC |
Hardware Trojan | HT |
Reverse Engineering | RE |
Artificial Intelligence | AI |
Machine Learning | ML |
Support Vector Machine | SVM |
Random Forest | RF |
Principal Component Analysis | PCA |
K-Nearest Neighbors | KNN |
Multi-layer Neural Network | MNN |
Convolutional Neural Network | CNN |
Artificial Neural Network | ANN |
Long Short-term Memory Network | LSTM |
Graph Neural Network | GNN |
Scale Name | Abbreviation | Number of Transistor |
---|---|---|
Small-scale Integrated Circuit | SSI | No more than 10 |
Medium-scale Integrated Circuit | MSI | [10,1000] |
Large-scale Integrated Circuit | LSI | (1000,10000] |
Very-large-scale Integrated Circuit | VLSI | (10000,1000000] |
Ultra-large-scale Integrated Circuit | ULSI | (1000000,10000000] |
Giga-scale Integrated Circuit | GSI | more than 100 million |
Type | HT | Implanting Phase | Activation Method | Description |
---|---|---|---|---|
Leak Information | AES-T100 | pre-silicon | create a code sequence | The AES-T100 Trojan leaks the encryption key via a CDMA covert channel, using PRNG to generate CDMA code, modulating the key bit XOR, and simulating a large capacitor circuit to leak information through the power channel. |
PIC16F84-T300 | pre-silicon | specific instruction | The PIC16F84-T300 Trojan is implanted during design and activated by executing a specific number of instructions. When triggered, it manipulates the EEPROM data line to leak secret information in the register. | |
S38584-T300 | pre-silicon | time interval | The S38584-T300 Trojan is implanted during the design phase and activated at time intervals, combining information leakage with function changes triggered by a counter that detects internal signal conversions when the threshold is exceeded. | |
Denial of Service | AES-T1800 | pre-silicon | predefined input plaintext | The goal of the AES-T1800 Trojan is to accelerate battery drain and shorten battery life. The Trojan is activated after detecting a predefined plaintext and increases power consumption through shift registers, shortening battery life. |
B15-T100 | pre-silicon | change the clock frequency | The B15-T100 Trojan causes denial of service by reducing the clock frequency when the 8th to 15th bits of the address line are 0xFF. After activation, the clock frequency is halved, slowing down the circuit operation. | |
BASICRSA-T200 | pre-silicon | “inExp” signal | The BASICRSA-T200 Trojan disables sender encoding and receiver decoding, causing the relevant modules to fail and achieving a denial of service attack. | |
WB_CONMAX-T100 | pre-silicon | comparator | The WB_CONMAX-T100 Trojan invalidates subsequent modules by fixing valid bits. It triggers via a comparator with a very low probability (). After activation, the highest four bits of the host address bus are fixed to “1”. | |
Degraded Performance | ETHERNETM AC10GE-T100 | post-silicon | always on | The ETHERNETMAC10GE-T100 Trojan is implanted during the manufacturing phase and is always active without any triggering conditions. Its load circuit cause critical path performance degradation. |
MEMCTRL-T100 | pre-silicon | combine with software | The MEMCTRL-T100 Trojan combines hardware and software vulnerabilities. The goal is to make the Flash Sleep control bit of the memory controller “1”, so that the flash memory device enters sleep or power-down mode, reducing performance. | |
MULTPYRA MID-T100 | post-silicon | always on | The MULTPYRAMID-T100 Trojan is implanted during the manufacturing phase, always active, and affects the IC’s critical path by narrowing the network n196. | |
S35932-T300 | pre-silicon | internal conditional | The S35932-T300 Trojan is implanted during the design phase and activates only in functional mode. It uses a RO load that the slows down the path when oscillating, resulting in performance degradation and denial of service. | |
Change Functionality | AES-T2300 | pre-silicon | special rare signals | The AES-T2300 Trojan is implanted in the AES-128 encryption module. It triggers when s2[89] and s5[121] are both high. After activation, the least significant bit of the encryption output is flipped, making the encryption module invalid. |
B19-T100 | pre-silicon | specific vector counter | The B19-T100 Trojan is a combined function-changing HT that includes a trigger and load module. The trigger is a specific vector counter activated within the 100–110 range. The load is an OR gate that can re-integrate the circuit design. | |
S15850-T100 | pre-silicon | reverse test enable signal | The S15850-T100 Trojan includes two comparators and flip-flops. The comparator drives the clock for the first flip-flop, which feeds into the second. The second flip-flop activates in functional mode by the reverse test enable signal. The load is the MUX of the output port, which leaks internal signals when activated. |
Method | Stage | Description |
---|---|---|
SVM | pre-silicon | Hasegawa et al. proposed five feature dimensions for pre-silicon stage training, set the features into specific feature vectors and put them into SVM classifier for training. [64] |
post-silcon | Vashistha et al. applied SVM to the physical inspection process. [65] | |
Hu et al. applied SVM to side-channel analysis. [66] | ||
Kulkarni et al. used SVM for runtime detection of multi-core platforms. [67] | ||
RF | pre-silicon | Pan et al. proposed a gate-level HT detection method that combines Shapley value analysis with decision trees. [68] |
Negishi et al. proposed a gate-level HT detection method based on ensemble learning. Using decision trees as the base learner, they achieved high detection accuracy. [69] | ||
Hasegawa et al. proposed a gate-level network list HT detection method based on RF and proposed 51 features HT. [70] | ||
Kurihara et al. applied RF-based methods to gate-level IP core detection and subsequently proposed 25 HT features based on trigger circuit structures in [71]. | ||
post-silicon | Lodhi et al. combined the power profile of the microprocessor instruction set with a decision tree to achieve runtime detection of HTs. [72] | |
Xiang et al. applied RF-based methods to side-channel detection of HTs. [73] | ||
PCA | pre-silicon | Dong et al. used the PCA technology to reduce the 16-dimensional feature space data to 2-dimensional space data. [74] |
post-silicon | Huang et al. applied PCA to dimensionality reduction of power-frequency data from FPGAs. [75] | |
Hu et al. applied PCA technology to the Trojan detection method based on multi-modal heat map characteristics. [76] | ||
Nowroz et al. applied PCA technology to the Trojan detection method of multi-modal power characteristics. [77] | ||
Yan et al. applied PCA technology to reduce the dimension of chip temperature data obtained during runtime. [78] | ||
KNN | pre-silicon | Seum et al. used KNN as a trainer for HT detection in the pre-silicon detection stage. They identified potential HTs through software simulation and analysis, thereby improving the security and reliability of IC. [79] |
post-silicon | Mohanraj et al. proposed a side-channel analysis technique based on power consumption traces, which uses a KNN classifier as an evaluator and combines it with an optimization algorithm for detection. [80] | |
Yang et al. proposed a side-channel analysis method, in which the KNN algorithm was used as the classifier. [81] | ||
Lodhi et al. proposed a method for runtime HT detection based on the power consumption profile of the microcontroller instruction set. The KNN algorithm is used to train the model. [72] | ||
K-means | pre-silicon | Salmani et al. used the K-means algorithm to detect HTs in gate-level netlists, achieving no golden model reference. [82] |
Salmani et al. proposed a progressive N-check (GNJ) technique, combined with the K-means algorithm, to reduce the false positive rate (FPR) of HT detection in gate-level netlists. [83] | ||
Bao et al. combined the K-means algorithm with RE. [84] | ||
Nguyen et al. applied the K-means algorithm to HT detection in side-channel analysis. [85] |
Method | Stage | Description |
---|---|---|
MNN | pre-silicon | Hasegawa et al. proposed an HT detection method based on MNN specifically targeting the gate-level netlist in the IC design stage. [88] |
Hasegawa et al. proposed a robust HT detection method (R-HTDetector) based on adversarial training, which was achieved by using MNN to train a training set containing a small number of adversarial samples. [89] | ||
CNN | pre-silicon | Sharma et al. proposed an HT detection technology based on deep CNN for HT detection in RE. [90] |
Yu et al. used a customized CNN model to automatically extract features and perform classification to detect HT using embedded PCP vectors as input. [91] | ||
TextCNN | pre-silicon | Xu et al. proposed an HT detection method based on TextCNN, which can efficiently identify HT node information in the topology. [92] |
Dong et al. proposed a cost-driven TextCNN HT detection method and introduced two strategies: global strategy and local strategy to balance accuracy and computational consumption. [93] | ||
ANN | pre-silicon | Wang et al. proposed an ANN-based HT detection method (DetectANN) for NoC. [94] |
post-silicon | Wang et al. used a special ANN, the ELM, and applied it to the side-channel analysis task of HT detection. [95] | |
Zhang et al. applied a feed-forward ANN, MLP model, to abnormal power consumption detection in SiP chips. [96] | ||
Khalid et al. used the trained MLP model to detect power anomalies generated between microprocessor instruction executions. [97] | ||
LSTM | pre-silicon | Lu et al. used a stacked LSTM network to detect Trojans by extracting vectors of sequential relationships between gates from netlist data. [98] |
Yu et al. used “Cell-Pin Splitter” to convert the netlist into a directed graph, adopted BFS to extract local blocks, used the skip-gram model to generate E-PCP word vectors, and then processed these vectors through a two-layer LSTM network to finally obtain the HT classification probability. [91] | ||
Pan et al. achieved zero-shot HT detection by combining LSTM and GCN, where LSTM acts as a memory. [99] | ||
GNN | pre-silicon | Yasaei et al. used GNN to convert IP core topology into data flow graphs, generated embedding vectors through GNN, and compared similarities to detect IP core piracy. [100] |
Yasaei et al. used the GNN4IP model to generate a data flow graph DFG and applied a GNN to extract circuit features, and then detected HTs through multi-layer perceptron classification. [101] | ||
Cheng et al. used the GNN4Gate model and bidirectional GNN to aggregate information from both the propagation and dispersion directions of circuit signals to comprehensively extract circuit features for HT detection. [102] | ||
Cheng et al. proposed a timely information fusion strategy to solve the problem of the limited node perception range when GNN unidirectionally aggregates circuit diagram information, thereby improving the accuracy of HT detection and model generalization ability. [103] | ||
The GNN4HT model proposed by Chen et al. adopts a two-stage strategy: in the first stage, a graph isomorphism network is used to locate and extract subgraph information of HTs. In the second stage, the subgraph information is trained through the GNN model to achieve multi-classification detection of HTs. [104] | ||
Reinforcement Learning | pre-silicon | Pan et al.proposed an automated test generation method TGRL for HT detection using reinforcement learning, which aims to generate test patterns by combining rare signal stimulation and controllability/observability analysis. [105] |
Chen et al.proposed a detection method AdaTest that combines reinforcement learning and adaptive sampling for the generation of logical test vectors. [106] | ||
Ensemble Learning | pre-silicon | Negishi et al. proposed a gate-level HT detection method based on ensemble learning. Using decision trees as the base learner, they achieved high detection accuracy. [69] |
Sharma et al. proposed an HT detection technology based on CW-XGB based on the XGBoost model, which uses the optimal SCOAP feature value set to detect Trojans from the gate-level network list. [107] | ||
Dong effectively screened and constructed 49 new effective feature sets from 56 original features through the XGBoost scoring mechanism to improve the accuracy and efficiency of gate-level HT detection. [108] | ||
Transfer Learning | post-silicon | Faezi et al. applied the HT detection model to new circuits through model transfer technology, and realized real-time detection without reference chips through self-reference technology, improving the practicality and flexibility of detection. [109] |
Sun et al. innovatively applied the deep learning model VGG-16 in the field of computer vision to side-channel analysis, especially in the time-frequency domain of electromagnetic signals, to improve the detection capability of HT. [110] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dong, C.; Qiu, D.; Li, B.; Yang, Y.; Lyu, C.; Cheng, D.; Zhang, H.; Chen, Z. A Review: The Beauty of Serendipity Between Integrated Circuit Security and Artificial Intelligence. Sensors 2025, 25, 4880. https://doi.org/10.3390/s25154880
Dong C, Qiu D, Li B, Yang Y, Lyu C, Cheng D, Zhang H, Chen Z. A Review: The Beauty of Serendipity Between Integrated Circuit Security and Artificial Intelligence. Sensors. 2025; 25(15):4880. https://doi.org/10.3390/s25154880
Chicago/Turabian StyleDong, Chen, Decheng Qiu, Bolun Li, Yang Yang, Chenxi Lyu, Dong Cheng, Hao Zhang, and Zhenyi Chen. 2025. "A Review: The Beauty of Serendipity Between Integrated Circuit Security and Artificial Intelligence" Sensors 25, no. 15: 4880. https://doi.org/10.3390/s25154880
APA StyleDong, C., Qiu, D., Li, B., Yang, Y., Lyu, C., Cheng, D., Zhang, H., & Chen, Z. (2025). A Review: The Beauty of Serendipity Between Integrated Circuit Security and Artificial Intelligence. Sensors, 25(15), 4880. https://doi.org/10.3390/s25154880