Trojan-Net Classification for Gate-Level Hardware Design Utilizing Boundary Net Structures

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Accelerators for Petri - net Analysis

| F or reachability analysis of Petri-nets an FPGA-based accelerator is proposed. Since the simple components of Petri-nets can be easily realized in high-density FPGAs, the complete problem can be mapped to silicon providing a solution environment faster than the traditional software-based simulators. Some classes of Petri-nets support the compositional analysis, this way the limited capacity ...

متن کامل

Discriminative Model Selection for Belief Net Structures

Bayesian belief nets (BNs) are often used for classification tasks, typically to return the most likely class label for a specified instance. Many BN-learners, however, attempt to find the BN that maximizes a different objective function — viz., likelihood, rather than classification accuracy — typically by first using some model selection criterion to identify an appropriate graphical structur...

متن کامل

Time Petri Net Unfoldings and Hardware Veriication

Real-time applications require hardware components to be predictable in terms of their temporal characteristics. For this reason synchronous (clocked) circuits have traditionally been used in real-time systems. With the advent of submicron technologies the role of asynchronous techniques in designing hardware platforms for real-time systems will dramatically increase. Yet the lack of eecient fo...

متن کامل

Petri Net Level WCET Analysis

We present an approach for Worst-Case Execution Time (WCET) Analysis of embedded system software that is generated from Petri net specifications. The main characteristic of the approach is that standard Petri net analysis methods are utilized in order to automatically derive additional flow information for WCET analysis. Furthermore, the approach presented in this paper clearly separates the an...

متن کامل

Hardware Trojan Detection Solutions and Design - for - Trust Challenges

computer 64 Published by the IEEE Computer Society 0018-9162/11/$26.00 © 2011 IEEE a trusted design center and foundry, it is expensive and economically infeasible given current trends in the globalization of IC design and fabrication. On the other hand, verifying trustworthiness requires a postmanufacturing step to validate conformance of the fabricated IC to the original functional and perfor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEICE Transactions on Information and Systems

سال: 2020

ISSN: 0916-8532,1745-1361

DOI: 10.1587/transinf.2019icl0003