scispace - formally typeset
C

Chongxi Bao

Researcher at University of Maryland, College Park

Publications -  19
Citations -  620

Chongxi Bao is an academic researcher from University of Maryland, College Park. The author has contributed to research in topics: Hardware Trojan & Side channel attack. The author has an hindex of 10, co-authored 19 publications receiving 512 citations.

Papers
More filters
Proceedings ArticleDOI

On application of one-class SVM to reverse engineering-based hardware Trojan detection

TL;DR: Simulation results show that the proposed innovative and robust reverseengineering approach, adapted from a well-studied machine learning method, one-class support vector machine, can detect hardware Trojans with high accuracy rate across different modeling and algorithm parameters.
Journal ArticleDOI

On Reverse Engineering-Based Hardware Trojan Detection

TL;DR: Simulation results using state-of-the-art tools on several publicly available circuits show that the proposed approach can detect HTs with high accuracy rate and a comparison of this approach with a previously proposed approach is conducted.
Proceedings ArticleDOI

Temperature tracking: an innovative run-time approach for hardware Trojan detection

TL;DR: This paper proposes innovative low-overhead approaches for run-time Trojan detection which exploit the thermal sensors already available in many modern systems to detect deviations in power/thermal profiles caused by Trojan activation.
Journal ArticleDOI

Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans

TL;DR: Three innovative low-overhead approaches for run-time Trojan detection which exploit the thermal sensors already available in many modern systems to detect deviations in power/thermal profiles caused by Trojan activation are proposed.
Journal ArticleDOI

Security and Vulnerability Implications of 3D ICs

TL;DR: This paper reports current research work on 3D integration based security in three major applications: supply chain attack prevention, side-channel attack mitigation, and trustworthy computing system design and summarizes its security opportunities and challenges.