Results 161 to 170 of about 817,598 (242)
Some of the next articles are maybe not open access.
Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection
Journal of Supercomputing, 2023Current hardware Trojan (HT) detection techniques are mostly developed based on a limited set of HT benchmarks. Existing HT benchmark circuits are generated with multiple shortcomings, i.e., (i) they are heavily biased by the designers’ mindset when ...
Amin Sarihi +3 more
semanticscholar +1 more source
Circuit Topology-Aware Vaccination-Based Hardware Trojan Detection
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023Hardware trojans (HTs) pose a critical security threat to modern integrated circuits (ICs) through malicious activities, including leaking critical information, executing unauthorized commands, and reducing IC lifetime.
Rakibul Hassan +3 more
semanticscholar +1 more source
Implementing hardware Trojans: Experiences from a hardware Trojan challenge
2011 IEEE 29th International Conference on Computer Design (ICCD), 2011Hardware Trojans have become a growing concern in the design of secure integrated circuits. In this work, we present a set of novel hardware Trojans aimed at evading detection methods, designed as part of the CSAW Embedded System Challenge 2010. We introduced and implemented unique Trojans based on side-channel analysis that leak the secret key in the ...
Georg T. Becker +5 more
openaire +1 more source
IEEE Symposium on Security and Privacy, 2023
Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial task – especially for security-enabled products. Depending on the concrete threat model, different techniques can be applied for this purpose.
Endres Puschner +5 more
semanticscholar +1 more source
Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial task – especially for security-enabled products. Depending on the concrete threat model, different techniques can be applied for this purpose.
Endres Puschner +5 more
semanticscholar +1 more source
TVF: A Metric for Quantifying Vulnerability Against Hardware Trojan Attacks
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2023The need for metrics for quantifying trustworthiness of electronic hardware against diverse threats on its integrity and confidentiality has greatly increased due to the increasing reliance on the untrusted global supply chain.
Jonathan Cruz +3 more
semanticscholar +1 more source
Using Path Features for Hardware Trojan Detection Based on Machine Learning Techniques
IEEE International Symposium on Quality Electronic Design, 2023As the outsourcing process in the design and fabrication to third parties becomes more popular in the IC industry, the consciousness of hardware security has been rising these years.
Chia-Heng Yen +2 more
semanticscholar +1 more source
2016 8th International Symposium on Telecommunications (IST), 2016
Exploring possible vulnerabilities for making hardware Trojans helps designers to improve the security and trust of integrated circuits (ICs). This paper discusses the hardware Trojan possibility in SRAM to evaluate the security of SRAM and evaluates the effectiveness of existing detection methods.
Roghayeh Saeidi +1 more
openaire +1 more source
Exploring possible vulnerabilities for making hardware Trojans helps designers to improve the security and trust of integrated circuits (ICs). This paper discusses the hardware Trojan possibility in SRAM to evaluate the security of SRAM and evaluates the effectiveness of existing detection methods.
Roghayeh Saeidi +1 more
openaire +1 more source
GNN4HT: A Two-Stage GNN-Based Approach for Hardware Trojan Multifunctional Classification
IEEE Transactions on Computer-Aided Design of Integrated Circuits and SystemsDue to the complexity of integrated circuit design and manufacturing process, an increasing number of third parties are outsourcing their untrusted intellectual property (IP) cores to pursue greater economic benefits, which may embed numerous security ...
Lihan Chen +7 more
semanticscholar +1 more source
XG Boost Algorithm based Hardware Trojan Detection in Hardware Circuits
IEEE International Conference on Electrical, Computer and Communication Technologies, 2023Hardware security is a protection that comes in the form of a physical device. A hardware security module provides security for sensitive data. Hardware trojan is an intentionally altered circuit of an Integrated Circuits chip.
A. Vennila +5 more
semanticscholar +1 more source
Strategic Hardware Trojan Testing with Hierarchical Trojan Types
2021 55th Annual Conference on Information Sciences and Systems (CISS), 2021In this paper, we consider the problem of detecting hardware Trojans in an Integrated Circuit (IC) from a game theoretic standpoint. The paper considers the presence of multiple classes of Trojans, with each class containing multiple Trojan types, and characterizes the Nash Equilibrium (NE) strategy for inserting a Trojan (from the perspective of a ...
Swastik Brahma +2 more
openaire +1 more source

