Results 1 to 10 of about 817,598 (242)

Hybrid multi‐level hardware Trojan detection platform for gate‐level netlists based on XGBoost

open access: yesIET Computers & Digital Techniques, 2022
Coping with the problem of malicious third‐party vendors implanting Hardware Trojan (HT) in the circuit design stage, this paper proposes a hybrid‐mode gate‐level hardware Trojan detection platform based on the XGBoost algorithm.
Ying Zhang   +6 more
doaj   +1 more source

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

Invisible Trojan-horse attack [PDF]

open access: yes, 2017
We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique.
Jain, Nitin   +3 more
core   +2 more sources

Hardware Trojan Detection Using Shapley Ensemble Boosting

open access: yesAsia and South Pacific Design Automation Conference, 2023
Due to globalized semiconductor supply chain, there is an increasing risk of exposing system-on-chip designs to hardware Trojans (HT). While there are promising machine Learning based HT detection techniques, they have three major limitations: ad-hoc ...
Zhixin Pan, P. Mishra
semanticscholar   +1 more source

Hardware Trojan Detection through Information Flow Security Verification

open access: yes, 2017
Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints.
Contreras, Gustavo   +5 more
core   +1 more source

Hardware Trojan Identification and Detection

open access: yesInternational Journal on Cryptography and Information Security, 2017
ABSTRACT The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques.
Moein, Samer   +3 more
openaire   +1 more source

Secure Run-Time Hardware Trojan Detection Using Lightweight Analytical Models

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Hardware Trojans, malicious components that attempt to prevent a chip from operating as expected, are carefully crafted to circumvent detection during the predeployment silicon design and verification stages.
Burin Amornpaisannon   +3 more
semanticscholar   +1 more source

Gate-Level Hardware Trojan Detection Method for Graph Neural Networks Based on Controllability Metrics [PDF]

open access: yesJisuanji gongcheng
With the continuous increase in globalization, third-party Intellectual Property (IP) core applications have become increasingly widespread. The gradual maturity of hardware Trojan attack technology enables the implantation of hardware Trojan in the chip
Yang ZHANG, Chang LIU, Shaoqing LI
doaj   +1 more source

Research on Influencing Factor of Hardware Trojan Side-channel Detection Method [PDF]

open access: yesJisuanji gongcheng, 2019
The side-channel detection method screens the hardware Trojan circuit by collecting physical parameters such as power consumption,delay,and electromagnetic field,but its detection performance is seriously affected by process fluctuation,and process ...
LI Ying,CHEN Lan,ZHOU Yinhao
doaj   +1 more source

A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things

open access: yesInternational Journal of Distributed Sensor Networks, 2019
With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things.
Chen Dong   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy