N
Nozomu Togawa
Researcher at Waseda University
Publications - 303
Citations - 1967
Nozomu Togawa is an academic researcher from Waseda University. The author has contributed to research in topics: High-level synthesis & Floorplan. The author has an hindex of 17, co-authored 278 publications receiving 1523 citations. Previous affiliations of Nozomu Togawa include Toyota & University of Kitakyushu.
Papers
More filters
Proceedings ArticleDOI
Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier
TL;DR: This paper proposes 51 Trojan features which describe Trojan nets from netlists and extracts the best set of 11 Trojan features out of the 51 features which can effectively detect Trojan nets, maximizing the F-measures.
Proceedings ArticleDOI
Hardware Trojans classification for gate-level netlists based on machine learning
TL;DR: A SVM-based hardware-Trojan classification method that can much increase the true positive rate compared to the existing state-of-the-art results in most of the cases and successfully classify a set of all the nets in an unknown netlist into Trojan ones and normal ones based on the learned SVM classifier.
Proceedings ArticleDOI
A score-based classification method for identifying hardware-trojans at gate-level netlists
TL;DR: This paper proposes a score-based classification method for identifying HT-free or HT-inserted gate-level netlists without using a Golden netlist, which does not directly detect HTs themselves in a gate- level netlist but a net included in HTs, which is called Trojan net instead.
Proceedings ArticleDOI
Hardware Trojans classification for gate-level netlists using multi-layer neural networks
TL;DR: A machine-learning-based hardware-Trojan detection method for gate-level netlists using multi-layer neural networks that obtained at most 100% true positive rate with this proposed method.
Journal ArticleDOI
Scan-Based Side-Channel Attack against RSA Cryptosystems Using Scan Signatures
TL;DR: A scan-based side-channel attack which enables us to retrieve a secret key in an RSA circuit based on detecting intermediate values calculated inAn RSA circuit by monitoring a 1-bit time-sequence specific to some intermediate values.