Results 91 to 100 of about 817,598 (242)
A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges
The remarkable success of machine learning (ML) in a variety of research domains has inspired academic and industrial communities to explore its potential to address hardware Trojan (HT) attacks.
Zhao Huang +3 more
semanticscholar +1 more source
Creating a blockchain platform: An empirical analysis in the Italian banking sector
Digital platforms continue to be a focal point for scholars and practitioners, with growing attention being paid to the dynamics that shape platform leadership. Against this backdrop, blockchain technology emerges for its disruptive potential, offering attractive opportunities for collaboration through shared infrastructure, and arguably remodelling ...
Giacomo Vella, Luca Gastaldi
wiley +1 more source
Extraction of intrinsic structure for Hardware Trojan detection [PDF]
Cryptology ePrint Archive: Report 2015/912In this paper we present a novel solution to address the problem of potential malicious circuitry on FPGA. This method is based on an a technique of structure extraction which consider the infection of an all lot.
Fournier, Jacques Jean-Alain +2 more
core +1 more source
Moving objects touch successive skin locations, providing spatial information. When a brush sweeps along the skin but rapidly accelerates to skip a patch in the middle, it creates deceptive temporal continuity between skin regions before and after the gap. This acceleration‐induced continuity causes spatial distortion: the untouched region perceptually
Tatjana Seizova‐Cajic +2 more
wiley +1 more source
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni +2 more
wiley +1 more source
Triggered Hardware Trojan Detection in IP Cores for Ensuring Safety in Cyber Physical Systems
Cyber physical systems (CPSs) increasingly depend on complex hardware IP cores to perform critical functions. However, triggered hardware Trojans’ stealthy, malicious modifications activated under rare conditions pose significant threats to the safety ...
Mahfuzur Rahman Talukder +3 more
doaj +1 more source
IP Soft Core Hardware Trojan Detection Method Based on Grayscale Graph Analysis [PDF]
With the refinement of the division of labor in chip design, manufacturing, and packaging processes, the use of third-party Intellectual Property(IP) soft cores for secondary development can significantly improve design efficiency and reduce duplication ...
Lin NI, Zihui LIU, Shuai ZHANG, Jiujiang HAN, Ming XIAN
doaj +1 more source
Hardware Trojan detection method based upon XGBoost model
This paper proposed a hardware Trojan detection method based upon XGBoost(eXtreme Gradient Boosting) model by using the analysis results of ring oscillator network, and used the cross-validation method to optimize the model.
Gao Hongbo +3 more
doaj +1 more source
The globalization of the semiconductor industry introduces vulnerabilities like hardware Trojans that compromise hardware security and pose serious risks to critical applications such as military and medical systems. Traditional hardware Trojan detection
Rama Devi Maddineni, Deepak Ch
doaj +1 more source
Hardware Trojans Inspired IP Watermarks
Editor’s note: Hardware watermarking (HW) is supposed to protect the authenticity of HW intellectual properties (IPs) but face the dual challenge of high overhead and ease of removal. HW Trojans are designed to overcome those same challenges for a very different purpose.
Mohammed Shayan +2 more
openaire +1 more source

