Results 141 to 150 of about 17,728 (178)
Some of the next articles are maybe not open access.

Hardware Trojan Detection

2011
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire   +1 more source

Improving hardware Trojan detection by retiming

Microprocessors and Microsystems, 2015
Abstract Hardware Trojan horses (HTHs) are challenging threats to the security of silicon chips. A promising solution is path-delay fingerprinting for HTH detection. This paper presents trust-driven retiming ( TDR ) , a synthesis approach to provide a circuit which can be analyzed more effectively by delay fingerprinting.
Seyed Mohammad Hossein Shekarian   +1 more
openaire   +1 more source

Hardware Trojan vulnerability

2018
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single ...
openaire   +2 more sources

Hardware Trojan Horses

2010
Over the last two decades we have become dependent on a network of electronic devices that supports a plethora of services, ranging from delivery of entertainment and news to maintenance of business records to filing of legal forms. This network provides a robust platform to handle all kinds of sensitive information at the personal, corporate, or ...
Mohammad Tehranipoor, Berk Sunar
openaire   +1 more source

Hardware Trojans

2022
Dominik Sisejkovic, Rainer Leupers
openaire   +1 more source

Introduction to Hardware Trojans

2017
Hardware Trojans are a major concern to the overall security and trust of any electronic system. These malicious modifications of circuits are designed to wreak havoc by altering the intended behavior of the system. When triggered, Trojans adversely affect electronics leading to reduced reliability, system failure, remote access into hardware ...
openaire   +1 more source

Hardware Trojan

2023
Steffen Becker, Christof Paar
openaire   +1 more source

HaTCh: Hardware Trojan Catcher

IACR Cryptol. ePrint Arch., 2014
Syed Kamran Haider   +5 more
openaire   +2 more sources

Test Generation for Hardware Trojan Detection Using Correlation Analysis and Genetic Algorithm

Transactions on Embedded Computing Systems, 2021
Haocheng Ma, Yanjiang Liu, Jiaji He
exaly  

Home - About - Disclaimer - Privacy