Results 141 to 150 of about 17,728 (178)
Some of the next articles are maybe not open access.
2011
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire +1 more source
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire +1 more source
Improving hardware Trojan detection by retiming
Microprocessors and Microsystems, 2015Abstract Hardware Trojan horses (HTHs) are challenging threats to the security of silicon chips. A promising solution is path-delay fingerprinting for HTH detection. This paper presents trust-driven retiming ( TDR ) , a synthesis approach to provide a circuit which can be analyzed more effectively by delay fingerprinting.
Seyed Mohammad Hossein Shekarian +1 more
openaire +1 more source
2018
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single ...
openaire +2 more sources
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single ...
openaire +2 more sources
2010
Over the last two decades we have become dependent on a network of electronic devices that supports a plethora of services, ranging from delivery of entertainment and news to maintenance of business records to filing of legal forms. This network provides a robust platform to handle all kinds of sensitive information at the personal, corporate, or ...
Mohammad Tehranipoor, Berk Sunar
openaire +1 more source
Over the last two decades we have become dependent on a network of electronic devices that supports a plethora of services, ranging from delivery of entertainment and news to maintenance of business records to filing of legal forms. This network provides a robust platform to handle all kinds of sensitive information at the personal, corporate, or ...
Mohammad Tehranipoor, Berk Sunar
openaire +1 more source
Introduction to Hardware Trojans
2017Hardware Trojans are a major concern to the overall security and trust of any electronic system. These malicious modifications of circuits are designed to wreak havoc by altering the intended behavior of the system. When triggered, Trojans adversely affect electronics leading to reduced reliability, system failure, remote access into hardware ...
openaire +1 more source
HaTCh: Hardware Trojan Catcher
IACR Cryptol. ePrint Arch., 2014Syed Kamran Haider +5 more
openaire +2 more sources
A machine learning based golden-free detection method for command-activated hardware Trojan
Information Sciences, 2020An Wang, Keke Gai, LieHuang Zhu
exaly
Test Generation for Hardware Trojan Detection Using Correlation Analysis and Genetic Algorithm
Transactions on Embedded Computing Systems, 2021Haocheng Ma, Yanjiang Liu, Jiaji He
exaly

