Results 161 to 170 of about 817,598 (242)
Some of the next articles are maybe not open access.

Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection

Journal of Supercomputing, 2023
Current hardware Trojan (HT) detection techniques are mostly developed based on a limited set of HT benchmarks. Existing HT benchmark circuits are generated with multiple shortcomings, i.e., (i) they are heavily biased by the designers’ mindset when ...
Amin Sarihi   +3 more
semanticscholar   +1 more source

Circuit Topology-Aware Vaccination-Based Hardware Trojan Detection

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023
Hardware trojans (HTs) pose a critical security threat to modern integrated circuits (ICs) through malicious activities, including leaking critical information, executing unauthorized commands, and reducing IC lifetime.
Rakibul Hassan   +3 more
semanticscholar   +1 more source

Implementing hardware Trojans: Experiences from a hardware Trojan challenge

2011 IEEE 29th International Conference on Computer Design (ICCD), 2011
Hardware Trojans have become a growing concern in the design of secure integrated circuits. In this work, we present a set of novel hardware Trojans aimed at evading detection methods, designed as part of the CSAW Embedded System Challenge 2010. We introduced and implemented unique Trojans based on side-channel analysis that leak the secret key in the ...
Georg T. Becker   +5 more
openaire   +1 more source

Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations

IEEE Symposium on Security and Privacy, 2023
Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial task – especially for security-enabled products. Depending on the concrete threat model, different techniques can be applied for this purpose.
Endres Puschner   +5 more
semanticscholar   +1 more source

TVF: A Metric for Quantifying Vulnerability Against Hardware Trojan Attacks

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2023
The need for metrics for quantifying trustworthiness of electronic hardware against diverse threats on its integrity and confidentiality has greatly increased due to the increasing reliance on the untrusted global supply chain.
Jonathan Cruz   +3 more
semanticscholar   +1 more source

Using Path Features for Hardware Trojan Detection Based on Machine Learning Techniques

IEEE International Symposium on Quality Electronic Design, 2023
As the outsourcing process in the design and fabrication to third parties becomes more popular in the IC industry, the consciousness of hardware security has been rising these years.
Chia-Heng Yen   +2 more
semanticscholar   +1 more source

SRAM hardware Trojan

2016 8th International Symposium on Telecommunications (IST), 2016
Exploring possible vulnerabilities for making hardware Trojans helps designers to improve the security and trust of integrated circuits (ICs). This paper discusses the hardware Trojan possibility in SRAM to evaluate the security of SRAM and evaluates the effectiveness of existing detection methods.
Roghayeh Saeidi   +1 more
openaire   +1 more source

GNN4HT: A Two-Stage GNN-Based Approach for Hardware Trojan Multifunctional Classification

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Due to the complexity of integrated circuit design and manufacturing process, an increasing number of third parties are outsourcing their untrusted intellectual property (IP) cores to pursue greater economic benefits, which may embed numerous security ...
Lihan Chen   +7 more
semanticscholar   +1 more source

XG Boost Algorithm based Hardware Trojan Detection in Hardware Circuits

IEEE International Conference on Electrical, Computer and Communication Technologies, 2023
Hardware security is a protection that comes in the form of a physical device. A hardware security module provides security for sensitive data. Hardware trojan is an intentionally altered circuit of an Integrated Circuits chip.
A. Vennila   +5 more
semanticscholar   +1 more source

Strategic Hardware Trojan Testing with Hierarchical Trojan Types

2021 55th Annual Conference on Information Sciences and Systems (CISS), 2021
In this paper, we consider the problem of detecting hardware Trojans in an Integrated Circuit (IC) from a game theoretic standpoint. The paper considers the presence of multiple classes of Trojans, with each class containing multiple Trojan types, and characterizes the Nash Equilibrium (NE) strategy for inserting a Trojan (from the perspective of a ...
Swastik Brahma   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy