Results 131 to 140 of about 17,728 (178)
Some of the next articles are maybe not open access.
A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware
2021 IEEE 51st International Symposium on Multiple-Valued Logic (ISMVL), 2021This paper presents a new formal method for detecting and identifying hardware Trojans (HTs) inserted into the datapath of cryptographic hardware based on Galois-field arithmetic such as for the Advanced Encryption Standard and elliptic curve cryptography. To detect HTs, our method first performs equivalence checking between the specifications given as
Akira Ito 0002, Rei Ueno, Naofumi Homma
openaire +1 more source
On Parametric Hardware Trojans
2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST), 2021With the eminence of third party foundry practice, insertion of hardware trojans in ICs is becoming a major threat. Insertion techniques of these hardware trojans are getting easier with sophisticated yet expensive equipment. The same very equipment which was basically used for IC surgeries is used for inserting hardware trojans.
openaire +1 more source
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014
Countless systems ranging from consumer electronics to military equipment are dependent on integrated circuits (ICs). A surprisingly large number of such systems are already security critical, e.g., medical devices, automotive electronics, or SCADA systems. If the underlying ICs in such applications are maliciously manipulated through hardware Trojans,
openaire +1 more source
Countless systems ranging from consumer electronics to military equipment are dependent on integrated circuits (ICs). A surprisingly large number of such systems are already security critical, e.g., medical devices, automotive electronics, or SCADA systems. If the underlying ICs in such applications are maliciously manipulated through hardware Trojans,
openaire +1 more source
2023 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED), 2023
Christian Lanius +3 more
openaire +1 more source
Christian Lanius +3 more
openaire +1 more source
Hardware Trojans in Microcircuits
2020This chapter is an overview dedicated to detailed analysis of structures and mechanisms of operation of hardware Trojans in modern microcircuits. The beginning of the chapter describes theoretical basis of designing safe electronic equipment for critical applications and the first documented facts of detection of hardware Trojans in critical ...
Anatoly Belous, Vitali Saladukha
openaire +1 more source
In-situ Trojan authentication for invalidating hardware-Trojan functions
2016 17th International Symposium on Quality Electronic Design (ISQED), 2016Due to the fact that we do not know who will create hardware Trojans (HTs), and when and where they would be inserted, it is very difficult to correctly and completely detect all the real HTs in untrusted ICs, and thus it is desired to incorporate in-situ HT invalidating functions into untrusted ICs as a countermeasure against HTs.
Masaru Oya +3 more
openaire +1 more source
Experiences in Hardware Trojan design and implementation
2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 2009We report our experiences in designing and implementing several hardware Trojans within the framework of the Embedded System Challenge competition that was held as part of the Cyber Security Awareness Week (CSAW) at the Polytechnic Institute of New York University in October 2008.
Yier Jin, Nathan Kupp, Yiorgos Makris
openaire +1 more source
Implementation of Parametric Hardware Trojan in FPGA
2019 IEEE International Test Conference in Asia (ITC-Asia), 2019The reconfigurability of FPGA makes it flexible for different applications. However, an FPGA may be delivered, designed, and deployed by different persons during its lifecycle, so anyone who can access the FPGA may bring in security issues. This paper proposes an implementation method of a parametric hardware Trojan in the FPGA.
Yipei Yang +5 more
openaire +1 more source
The Hardware Trojan System: An Online Suite of Tools for Hardware Trojan Analysis
2017Hardware trojans are accidental or malicious modifications of integrated circuits. There is currently no accepted standard for describing trojans or the methods used to detect them. A taxonomic structure was recently proposed that is a viable candidate for standardization.
Nicholas Houghton +3 more
openaire +1 more source

