Results 1 to 10 of about 17,678 (133)

A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study [PDF]

open access: yesPeerJ Computer Science, 2020
Integrated circuits may be vulnerable to hardware Trojan attacks during its design or fabrication phases. This article is a case study of the design of a Viterbi decoder and the effect of hardware Trojans on a coded communication system employing the ...
Varsha Kakkara   +5 more
doaj   +3 more sources

Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) [PDF]

open access: yesMicromachines, 2023
Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical.
Musharraf Hussain   +6 more
doaj   +2 more sources

Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a Physically Unclonable Function-Based Countermeasure Detection Technique [PDF]

open access: yesMicromachines
Convolutional neural networks (CNNs) have demonstrated significant superiority in modern artificial intelligence (AI) applications. To accelerate the inference process of CNNs, reconfigurable CNN accelerators that support diverse networks are widely ...
Jia Hou   +3 more
doaj   +2 more sources

System-level protection and hardware Trojan detection using weighted voting [PDF]

open access: yesJournal of Advanced Research, 2014
The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during ...
Hany A.M. Amin   +2 more
doaj   +2 more sources

Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method

open access: yesIEEE Access, 2019
Due to the globalization of the design and fabrication process of integrated circuits (ICs), ICs are becoming vulnerable to hardware Trojans. Most of the existing hardware Trojan detection works assume that the testing stage is trustworthy.
Mingfu Xue   +3 more
doaj   +3 more sources

Implantation and Detection of a Sequential Bus Hardware Trojan [PDF]

open access: yesJisuanji gongcheng, 2021
RS bus integrated circuit has been widely used in aerospace and industrial control.With the hardware Trojan detection for integrated circuits becoming a research hotspot,as a branch of bus hardware Trojan research field,its design has been paid more and ...
HUANG Jiaoying, LI Shengyu, GAO Cheng, YANG Daming
doaj   +1 more source

Survey on model checking based hardware Trojan detection technology

open access: yes网络与信息安全学报, 2021
Hardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit.In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed.As one of ...
Qizhi ZHANG   +3 more
doaj   +3 more sources

Research on electromagnetic radiation based side-channel analysis method for hardware Trojan detection

open access: yes网络与信息安全学报, 2021
With the globalization of the integrated circuit industry, hardware Trojan is becoming the main threat to integrated circuits. At present, the side-channel analysis which can make a good trade-off between detection ability and cost, has attracted more ...
TANG Yongkang, HU Xing, SU Ting, LI Shaoqing
doaj   +3 more sources

Design and detection of hardware Trojan based on satisfiability don't cares

open access: yes网络与信息安全学报, 2021
Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.
WU Lingjuan   +1 more
doaj   +3 more sources

IMPLEMENTATION OF A HARDWARE TROJAN CHIP DETECTOR MODEL USING ARDUINO MICROCONTROLLER [PDF]

open access: yesApplied Computer Science, 2021
These days, hardware devices and its associated activities are greatly impacted by threats amidst of various technologies. Hardware trojans are malicious modifications made to the circuitry of an integrated circuit, Exploiting such alterations and ...
Kadeejah ABDULSALAM   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy