scispace - formally typeset
N

Nozomu Togawa

Researcher at Waseda University

Publications -  303
Citations -  1967

Nozomu Togawa is an academic researcher from Waseda University. The author has contributed to research in topics: High-level synthesis & Floorplan. The author has an hindex of 17, co-authored 278 publications receiving 1523 citations. Previous affiliations of Nozomu Togawa include Toyota & University of Kitakyushu.

Papers
More filters
Proceedings ArticleDOI

Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier

TL;DR: This paper proposes 51 Trojan features which describe Trojan nets from netlists and extracts the best set of 11 Trojan features out of the 51 features which can effectively detect Trojan nets, maximizing the F-measures.
Proceedings ArticleDOI

Hardware Trojans classification for gate-level netlists based on machine learning

TL;DR: A SVM-based hardware-Trojan classification method that can much increase the true positive rate compared to the existing state-of-the-art results in most of the cases and successfully classify a set of all the nets in an unknown netlist into Trojan ones and normal ones based on the learned SVM classifier.
Proceedings ArticleDOI

A score-based classification method for identifying hardware-trojans at gate-level netlists

TL;DR: This paper proposes a score-based classification method for identifying HT-free or HT-inserted gate-level netlists without using a Golden netlist, which does not directly detect HTs themselves in a gate- level netlist but a net included in HTs, which is called Trojan net instead.
Proceedings ArticleDOI

Hardware Trojans classification for gate-level netlists using multi-layer neural networks

TL;DR: A machine-learning-based hardware-Trojan detection method for gate-level netlists using multi-layer neural networks that obtained at most 100% true positive rate with this proposed method.
Journal ArticleDOI

Scan-Based Side-Channel Attack against RSA Cryptosystems Using Scan Signatures

TL;DR: A scan-based side-channel attack which enables us to retrieve a secret key in an RSA circuit based on detecting intermediate values calculated inAn RSA circuit by monitoring a 1-bit time-sequence specific to some intermediate values.