Results 121 to 130 of about 17,728 (178)
Some of the next articles are maybe not open access.

Related searches:

SRAM hardware Trojan

2016 8th International Symposium on Telecommunications (IST), 2016
Exploring possible vulnerabilities for making hardware Trojans helps designers to improve the security and trust of integrated circuits (ICs). This paper discusses the hardware Trojan possibility in SRAM to evaluate the security of SRAM and evaluates the effectiveness of existing detection methods.
Roghayeh Saeidi   +1 more
openaire   +1 more source

Implementing hardware Trojans: Experiences from a hardware Trojan challenge

2011 IEEE 29th International Conference on Computer Design (ICCD), 2011
Hardware Trojans have become a growing concern in the design of secure integrated circuits. In this work, we present a set of novel hardware Trojans aimed at evading detection methods, designed as part of the CSAW Embedded System Challenge 2010. We introduced and implemented unique Trojans based on side-channel analysis that leak the secret key in the ...
Georg T. Becker   +5 more
openaire   +1 more source

Testability of Cryptographic Hardware and Detection of Hardware Trojans

2011 Asian Test Symposium, 2011
Cryptographic algorithms are routinely used toper form computationally intense operations over increasingly larger volumes of data, and in order to meet the high throughput requirements of the applications, are often implemented by VLSI designs. The high complexity of such implementations raises concern about their reliability. In order to improve upon
Debdeep Mukhopadhyay   +1 more
openaire   +1 more source

Trustworthy Hardware: Identifying and Classifying Hardware Trojans

Computer, 2010
For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
Ramesh Karri   +3 more
openaire   +1 more source

A Survey of Hardware Trojan Taxonomy and Detection

open access: yesIEEE Design and Test of Computers, 2010
Editor's note:Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. This article presents a classification of hardware Trojans and a survey of published techniques for Trojan detection.
Mohammad Tehranipoor   +1 more
exaly   +2 more sources

Rise of the hardware Trojans

2011 IEEE 17th International On-Line Testing Symposium, 2011
Driven by strong economic incentives the globalization of the semiconductor design and fabrication industries has given rise to numerous vulnerabilities in the manufacturing chain. From design to production countless hands contribute until fabrication is completed.
openaire   +1 more source

Strategic Hardware Trojan Testing with Hierarchical Trojan Types

2021 55th Annual Conference on Information Sciences and Systems (CISS), 2021
In this paper, we consider the problem of detecting hardware Trojans in an Integrated Circuit (IC) from a game theoretic standpoint. The paper considers the presence of multiple classes of Trojans, with each class containing multiple Trojan types, and characterizes the Nash Equilibrium (NE) strategy for inserting a Trojan (from the perspective of a ...
Swastik Brahma   +2 more
openaire   +1 more source

Hardware Trojan for security LSI

2013 IEEE International Conference on Consumer Electronics (ICCE), 2013
A hardware Trojan has become a serious problem of consumer electronics in recent years. The present study proposes a new hardware Trojan in a countermeasure circuit and evaluates the weakness of the countermeasure circuit through simulation experiments.
Masaya Yoshikawa   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy