Results 91 to 100 of about 817,598 (242)

A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges

open access: yesIEEE Access, 2020
The remarkable success of machine learning (ML) in a variety of research domains has inspired academic and industrial communities to explore its potential to address hardware Trojan (HT) attacks.
Zhao Huang   +3 more
semanticscholar   +1 more source

Creating a blockchain platform: An empirical analysis in the Italian banking sector

open access: yesCreativity and Innovation Management, Volume 34, Issue 2, Page 393-413, June 2025.
Digital platforms continue to be a focal point for scholars and practitioners, with growing attention being paid to the dynamics that shape platform leadership. Against this backdrop, blockchain technology emerges for its disruptive potential, offering attractive opportunities for collaboration through shared infrastructure, and arguably remodelling ...
Giacomo Vella, Luca Gastaldi
wiley   +1 more source

Extraction of intrinsic structure for Hardware Trojan detection [PDF]

open access: yes, 2015
Cryptology ePrint Archive: Report 2015/912In this paper we present a novel solution to address the problem of potential malicious circuitry on FPGA. This method is based on an a technique of structure extraction which consider the infection of an all lot.
Fournier, Jacques Jean-Alain   +2 more
core   +1 more source

Shrinking the Skin: Motion Results in Compressive Mislocalization of Stimuli Applied 10 s Post‐Motion

open access: yesEuropean Journal of Neuroscience, Volume 61, Issue 7, April 2025.
Moving objects touch successive skin locations, providing spatial information. When a brush sweeps along the skin but rapidly accelerates to skip a patch in the middle, it creates deceptive temporal continuity between skin regions before and after the gap. This acceleration‐induced continuity causes spatial distortion: the untouched region perceptually
Tatjana Seizova‐Cajic   +2 more
wiley   +1 more source

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Triggered Hardware Trojan Detection in IP Cores for Ensuring Safety in Cyber Physical Systems

open access: yesChips
Cyber physical systems (CPSs) increasingly depend on complex hardware IP cores to perform critical functions. However, triggered hardware Trojans’ stealthy, malicious modifications activated under rare conditions pose significant threats to the safety ...
Mahfuzur Rahman Talukder   +3 more
doaj   +1 more source

IP Soft Core Hardware Trojan Detection Method Based on Grayscale Graph Analysis [PDF]

open access: yesJisuanji gongcheng
With the refinement of the division of labor in chip design, manufacturing, and packaging processes, the use of third-party Intellectual Property(IP) soft cores for secondary development can significantly improve design efficiency and reduce duplication ...
Lin NI, Zihui LIU, Shuai ZHANG, Jiujiang HAN, Ming XIAN
doaj   +1 more source

Hardware Trojan detection method based upon XGBoost model

open access: yesDianzi Jishu Yingyong, 2019
This paper proposed a hardware Trojan detection method based upon XGBoost(eXtreme Gradient Boosting) model by using the analysis results of ring oscillator network, and used the cross-validation method to optimize the model.
Gao Hongbo   +3 more
doaj   +1 more source

Golden Chip-Free Hardware Trojan Detection Using Attention-Based Non-Local Convolution With Simple Recurrent Unit

open access: yesIEEE Access
The globalization of the semiconductor industry introduces vulnerabilities like hardware Trojans that compromise hardware security and pose serious risks to critical applications such as military and medical systems. Traditional hardware Trojan detection
Rama Devi Maddineni, Deepak Ch
doaj   +1 more source

Hardware Trojans Inspired IP Watermarks

open access: yesIEEE Design & Test, 2019
Editor’s note: Hardware watermarking (HW) is supposed to protect the authenticity of HW intellectual properties (IPs) but face the dual challenge of high overhead and ease of removal. HW Trojans are designed to overcome those same challenges for a very different purpose.
Mohammed Shayan   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy