Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning
The electromagnetic Trojan attack can break through the physical isolation to attack, and the leaked channel does not use the system network resources, which makes the traditional firewall and other intrusion detection devices unable to effectively prevent. Based on the existing research results, th...
Main Authors: | Jiazhong Lu, Xiaolei Liu, Shibin Zhang, Yan Chang |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2020/6641844 |
Similar Items
-
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning
by: Teng Hu, et al.
Published: (2019-01-01) -
A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits
by: Qiang Liu, et al.
Published: (2019-01-01) -
Built-In Return-Oriented Programs in Embedded Systems and Deep Learning for Hardware Trojan Detection
by: Weidler, Nathanael R.
Published: (2019) -
Research on detecting mechanism for Trojan horse based on PE file
by: Pan, Ming
Published: (2009) -
Research on detecting mechanism for Trojan horse based on PE file
by: Pan, Ming
Published: (2009)