Results 101 to 110 of about 817,598 (242)
Hardware Security in IoT Devices with Emphasis on Hardware Trojans
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software ...
Simranjeet Sidhu +2 more
doaj +1 more source
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs. [PDF]
Ali L, Farshad.
europepmc +1 more source
Hardware Trojans detection based on projection pursuit
A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension ...
Peng ZHANG, Xin-cheng WANG, Qing ZHOU
doaj +2 more sources
We present a Golden-Model-free framework for hardware Trojan (HT) detection that treats temperature not as noise to remove but as physical context that organizes electromagnetic (EM) variability.
Daehyeon Lee +3 more
doaj +1 more source
Accidental overwriting of files or of memory regions belonging to other programs, browsing of personal files by superusers, Trojan horses, and viruses are examples of breakdowns in workstations and personal computers that would be significantly reduced ...
Denning, Peter J.
core +1 more source
Hardware trojans in reconfigurable computing
Wettstreit zwischen der Entwicklung neuer Hardwaretrojaner und entsprechender Gegenma nahmen beschreiten Widersacher immer raffiniertere Wege um Schaltungsentw rfe zu infizieren und dabei selbst fortgeschrittene Test- und Verifikationsmethoden zu berlisten.
openaire +2 more sources
The worm, Trojan horse, bacterium, and virus are destructive programs that attack information stored in a computer's memory. Virus programs, which propagate by incorporating copies of themselves into other programs, are a growing menace in the late-1980s
Denning, Peter J.
core +1 more source
A neural network framework based on ConvNeXt for side-channel hardware Trojan detection
Researchers in the field of hardware security have been dedicated to the study of hardware Trojan detection. Among the various approaches, side-channel detection methods are widely used because of their high detection accuracy and fewer constraints ...
Yuchan Gao +4 more
doaj +1 more source
87th Annual Meeting of the Meteoritical Society 2025: Abstracts
Meteoritics &Planetary Science, Volume 60, Issue S1, Page 30-350, August 2025.
wiley +1 more source
Cloud computing environments increasingly provision field-programmable gate arrays (FPGAs) for their programmability and hardware-level parallelism. While FPGAs are typically used by one tenant at a time, multitenant schemes supporting spatial sharing of
Dina G. Mahmoud +4 more
doaj +1 more source

