C
Chongxi Bao
Researcher at University of Maryland, College Park
Publications - 19
Citations - 620
Chongxi Bao is an academic researcher from University of Maryland, College Park. The author has contributed to research in topics: Hardware Trojan & Side channel attack. The author has an hindex of 10, co-authored 19 publications receiving 512 citations.
Papers
More filters
Proceedings ArticleDOI
On application of one-class SVM to reverse engineering-based hardware Trojan detection
TL;DR: Simulation results show that the proposed innovative and robust reverseengineering approach, adapted from a well-studied machine learning method, one-class support vector machine, can detect hardware Trojans with high accuracy rate across different modeling and algorithm parameters.
Journal ArticleDOI
On Reverse Engineering-Based Hardware Trojan Detection
TL;DR: Simulation results using state-of-the-art tools on several publicly available circuits show that the proposed approach can detect HTs with high accuracy rate and a comparison of this approach with a previously proposed approach is conducted.
Proceedings ArticleDOI
Temperature tracking: an innovative run-time approach for hardware Trojan detection
TL;DR: This paper proposes innovative low-overhead approaches for run-time Trojan detection which exploit the thermal sensors already available in many modern systems to detect deviations in power/thermal profiles caused by Trojan activation.
Journal ArticleDOI
Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans
TL;DR: Three innovative low-overhead approaches for run-time Trojan detection which exploit the thermal sensors already available in many modern systems to detect deviations in power/thermal profiles caused by Trojan activation are proposed.
Journal ArticleDOI
Security and Vulnerability Implications of 3D ICs
TL;DR: This paper reports current research work on 3D integration based security in three major applications: supply chain attack prevention, side-channel attack mitigation, and trustworthy computing system design and summarizes its security opportunities and challenges.