A cycle-level recovery method for embedded processor against HT tamper. [PDF]
Zhou W, Ye KH, Yuan S, Li L.
europepmc +1 more source
A Circuit-Level Solution for Secure Temperature Sensor. [PDF]
Kajol MA, Monjur MMR, Yu Q.
europepmc +1 more source
Robust hardware Trojan detection leveraging dual-domain features and stacked ensemble learning
Cyber-physical systems rely on sensors, communication, and computing, all powered by integrated circuits (ICs). These ICs are vulnerable to malicious hardware attacks, with hardware Trojans being one of the stealthiest threats.
Sefatun-Noor Puspa +5 more
doaj +1 more source
Dataset for hardware Trojan detection
Nowadays, cloud services rely extensively on the use of virtual machines to enforce security by isolation. However, hardware trojan attacks break this assumption. Within these attacks, cache side-channel attacks such as Spectre and Meltdown are the focus of this work.
openaire +1 more source
Intelligent Electromagnetic Sensors for Non-Invasive Trojan Detection. [PDF]
Chen E, Kan J, Yang BY, Zhu J, Chen V.
europepmc +1 more source
Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol. [PDF]
Yang CW.
europepmc +1 more source
A dual mode self-test for a stand alone AES core. [PDF]
Hossain FS +3 more
europepmc +1 more source
Hardware Trojans. Part 4: software and hardware countermeasures [PDF]
E. Kuznetsov, A. Saurov
openaire +1 more source
A Review: The Beauty of Serendipity Between Integrated Circuit Security and Artificial Intelligence. [PDF]
Dong C +7 more
europepmc +1 more source
Near-Field Microwave Sensing for Chip-Level Tamper Detection. [PDF]
Saadat Safa M, Tajik S.
europepmc +1 more source

