Construction of knowledge graph of hardware Trojan detection method
Author
Abstract

In order to visually present all kinds of hardware Trojan horse detection methods and their relationship, a method is proposed to construct the knowledge graph of hardware Trojan horse detection technology. Firstly, the security-related knowledge of hardware Trojan horse is analyzed, then the entity recognition and relationship extraction are carried out by using BiLSTM-CRF model, and the construction of knowledge graph is completed. Finally, the knowledge is stored and displayed visually by using graph database neo4j. The combination of knowledge graph and hardware Trojan security field can summarize the existing detection technologies, provide a basis for the analysis of hardware Trojans, vigorously promote the energy Internet security construction, and steadily enhance the energy Internet active defense capability.

Year of Publication
2022
Date Published
apr
Publisher
IEEE
Conference Location
Hangzhou, China
ISBN Number
978-1-66541-819-5
URL
https://ieeexplore.ieee.org/document/9783791/
DOI
10.1109/ACPEE53904.2022.9783791
Google Scholar | BibTeX | DOI