Trojan Detection

On Trojan Signatures in Large Language Models of Code

Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour | Published: 2024-02-23 | Updated: 2024-03-07
LLM Security
Trojan Horse Signature
Trojan Detection

Uncertainty-Aware Hardware Trojan Detection Using Multimodal Deep Learning

Authors: Rahul Vishwakarma, Amin Rezaei | Published: 2024-01-15 | Updated: 2024-01-23
Brier Score Evaluation Method
Trojan Detection
Quantification of Uncertainty

Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection

Authors: Rahul Vishwakarma, Amin Rezaei | Published: 2023-10-14
Dataset Generation
Trojan Detection
Quantification of Uncertainty

R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training

Authors: Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa | Published: 2022-05-27
Security Assurance
Trojan Detection
Feature Extraction Method

Automatic Hardware Trojan Insertion using Machine Learning

Authors: Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, Swarup Bhunia | Published: 2022-04-18
Algorithm Design
Trojan Detection
Machine Learning Method

An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks

Authors: Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar | Published: 2022-04-08
Trojan Horse Signature
Trojan Detection
Backdoor Attack

FuCE: Fuzzing+Concolic Execution guided Trojan Detection in Synthesizable Hardware Designs

Authors: Mukta Debnath, Animesh Basak Chowdhury, Debasri Saha, Susmita Sur-Kolay | Published: 2021-11-01
Security Testing
Trojan Detection
Threat modeling

TAD: Trigger Approximation based Black-box Trojan Detection for AI

Authors: Xinqiao Zhang, Huili Chen, Farinaz Koushanfar | Published: 2021-02-03 | Updated: 2021-04-20
Watermarking
Trojan Detection
Backdoor Attack

CLEANN: Accelerated Trojan Shield for Embedded Neural Networks

Authors: Mojan Javaheripi, Mohammad Samragh, Gregory Fields, Tara Javidi, Farinaz Koushanfar | Published: 2020-09-04
Trojan Detection
Membership Inference
Image Processing

Live Trojan Attacks on Deep Neural Networks

Authors: Robby Costales, Chengzhi Mao, Raphael Norwitz, Bryan Kim, Junfeng Yang | Published: 2020-04-22 | Updated: 2020-05-27
Trojan Detection
Attack Method
Deep Learning Technology