Results 111 to 120 of about 817,598 (242)

Robust hardware Trojan detection leveraging dual-domain features and stacked ensemble learning

open access: yesCybersecurity
Cyber-physical systems rely on sensors, communication, and computing, all powered by integrated circuits (ICs). These ICs are vulnerable to malicious hardware attacks, with hardware Trojans being one of the stealthiest threats.
Sefatun-Noor Puspa   +5 more
doaj   +1 more source

Dataset for hardware Trojan detection

open access: yes, 2022
Nowadays, cloud services rely extensively on the use of virtual machines to enforce security by isolation. However, hardware trojan attacks break this assumption. Within these attacks, cache side-channel attacks such as Spectre and Meltdown are the focus of this work.
openaire   +1 more source

A dual mode self-test for a stand alone AES core. [PDF]

open access: yesPLoS One, 2021
Hossain FS   +3 more
europepmc   +1 more source

Hardware Trojans. Part 4: software and hardware countermeasures [PDF]

open access: yesNanoindustry Russia, 2017
E. Kuznetsov, A. Saurov
openaire   +1 more source

Home - About - Disclaimer - Privacy