{"id":"https://openalex.org/W2400831429","doi":"https://doi.org/10.1109/isqed.2016.7479228","title":"SVM-based real-time hardware Trojan detection for many-core platform","display_name":"SVM-based real-time hardware Trojan detection for many-core platform","publication_year":2016,"publication_date":"2016-03-01","ids":{"openalex":"https://openalex.org/W2400831429","doi":"https://doi.org/10.1109/isqed.2016.7479228","mag":"2400831429"},"language":"en","primary_location":{"id":"doi:10.1109/isqed.2016.7479228","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed.2016.7479228","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 17th International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054888852","display_name":"Amey Kulkarni","orcid":"https://orcid.org/0000-0003-3061-8269"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Amey Kulkarni","raw_affiliation_strings":["Department of Computer Science & Electrical Engineering, University of Maryland, Baltimore County"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Electrical Engineering, University of Maryland, Baltimore County","institution_ids":["https://openalex.org/I79272384"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078881749","display_name":"Youngok Pino","orcid":null},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Youngok Pino","raw_affiliation_strings":["Information Sciences Institute, University of Southern California"],"affiliations":[{"raw_affiliation_string":"Information Sciences Institute, University of Southern California","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084010501","display_name":"Tinoosh Mohsenin","orcid":"https://orcid.org/0000-0001-5551-2124"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tinoosh Mohsenin","raw_affiliation_strings":["Department of Computer Science & Electrical Engineering, University of Maryland, Baltimore County"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Electrical Engineering, University of Maryland, Baltimore County","institution_ids":["https://openalex.org/I79272384"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054888852"],"corresponding_institution_ids":["https://openalex.org/I79272384"],"apc_list":null,"apc_paid":null,"fwci":10.5592,"has_fulltext":false,"cited_by_count":83,"citation_normalized_percentile":{"value":0.98816676,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"362","last_page":"367"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.7672216892242432},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.698155403137207},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6543468236923218},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6069992780685425},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5627022385597229},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.5374897122383118},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5098125338554382},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5051663517951965},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.5051074624061584},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.5044769048690796},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.44850224256515503},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.26006025075912476},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19157493114471436},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18027108907699585}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.7672216892242432},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.698155403137207},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6543468236923218},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6069992780685425},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5627022385597229},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.5374897122383118},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5098125338554382},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5051663517951965},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.5051074624061584},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.5044769048690796},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.44850224256515503},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.26006025075912476},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19157493114471436},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18027108907699585},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isqed.2016.7479228","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed.2016.7479228","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 17th International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1485721176","https://openalex.org/W1996090281","https://openalex.org/W2003368250","https://openalex.org/W2040990639","https://openalex.org/W2044479847","https://openalex.org/W2049347931","https://openalex.org/W2101528158","https://openalex.org/W2121030089","https://openalex.org/W2136613319","https://openalex.org/W2161238936","https://openalex.org/W2162979447","https://openalex.org/W2175486934","https://openalex.org/W2186843572","https://openalex.org/W2188648459","https://openalex.org/W2442112158","https://openalex.org/W2511296762","https://openalex.org/W4234193034"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2999465529","https://openalex.org/W2382172865","https://openalex.org/W1500594134","https://openalex.org/W4321062229","https://openalex.org/W4206269447","https://openalex.org/W2740504204","https://openalex.org/W1984975890"],"abstract_inverted_index":{"Hardware":[0,115],"Trojans":[1,19,36,152],"inserted":[2],"during":[3,57],"design":[4,10,28],"or":[5,12,38],"fabrication":[6],"time":[7],"by":[8,114],"untrustworthy":[9],"house":[11],"foundry":[13],"possesses":[14],"important":[15],"security":[16,164,195],"concerns.":[17],"These":[18],"lead":[20],"to":[21,33,139,189],"un-desired":[22],"change":[23],"in":[24,134],"functionality":[25],"of":[26,60,137,162],"the":[27,135,160,193],"and":[29,103,185],"provide":[30],"easy":[31],"access":[32],"sensitive":[34],"information.":[35],"attacks":[37,112],"malicious":[39],"activities":[40],"are":[41],"triggered":[42,105,113],"based":[43,77,96,153],"on":[44,78,97,154,181],"very":[45],"rare":[46],"conditions,":[47],"which":[48],"can":[49,55],"evade":[50],"test-time":[51],"Trojan":[52,70,104],"detection":[53,71,132,171,212],"but":[54],"arise":[56],"long":[58],"hours":[59],"field":[61],"operation.":[62],"In":[63],"this":[64],"paper":[65,108],"we":[66,166],"propose":[67],"a":[68,74,142,168,174],"run-time":[69],"architecture":[72,146],"for":[73,144],"custom":[75],"many-core":[76,98,145],"Machine":[79,86,128],"Learning":[80],"technique.":[81],"We":[82],"exploit":[83],"Support":[84,126],"Vector":[85,127],"(SVM)":[87,129],"supervised":[88],"machine":[89],"learning":[90],"algorithms.":[91],"The":[92,107,177,202],"Data-set":[93],"is":[94,179,207],"generated":[95],"router":[99],"behavior":[100],"under":[101],"normal":[102],"settings.":[106],"targets":[109],"different":[110,156],"communication":[111],"Trojans,":[116],"namely":[117],"core":[118],"address":[119],"spoofing,":[120],"traffic":[121],"diversion,":[122],"route":[123],"looping":[124],"attack.":[125],"algorithm":[130,178],"has":[131],"accuracy":[133],"range":[136],"94%":[138],"97%.We":[140],"implemented":[141,208],"framework":[143,196],"with":[147,192,209],"SVM":[148],"kernel":[149],"while":[150],"triggering":[151],"two":[155],"conditions.":[157],"To":[158],"demonstrate":[159],"performance":[161],"proposed":[163,194],"framework,":[165],"implement":[167],"bio-medical":[169],"seizure":[170],"application":[172],"as":[173],"case":[175],"study.":[176],"mapped":[180],"64":[182],"processing":[183],"cores":[184],"it":[186,197],"takes":[187],"2.1\u00b5S":[188],"execute":[190],"whereas":[191],"requires":[198],"4.8\u00b5S":[199],"execution":[200],"time.":[201],"Distributed":[203],"Attack":[204],"Detection":[205],"Framework":[206],"each":[210],"attack":[211],"module":[213],"having":[214],"2%":[215],"area":[216],"overhead.":[217]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":13},{"year":2018,"cited_by_count":12},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
