Results 181 to 190 of about 817,598 (242)
Some of the next articles are maybe not open access.

GNN4TJ: Graph Neural Networks for Hardware Trojan Detection at Register Transfer Level

Design, Automation and Test in Europe, 2021
The time to market pressure and resource constraints has pushed System-on-Chip (SoC) designers toward outsourcing the design and using third-party Intellectual Property (IP). It has created an opportunity for rogue entities in the Integrated Circuit (IC)
Rozhin Yasaei, Shi Yu, M. A. Faruque
semanticscholar   +1 more source

Hardware Trojan Detection using Unsupervised Machine Learning Algorithms in the Gate-level Netlist

IEEE International Conference on Electronics, Computing and Communication Technologies
Now-a-days, the density of gates in VLSI circuits is rapidly increasing, it is becoming more difficult to detect malicious circuits. The malicious nets present in the circuit, named "hardware trojans," can be added in the pre-silicon and post-silicon ...
Karthikeyan S, Prabhu E
semanticscholar   +1 more source

Hardware Trojan Horses

2010
Over the last two decades we have become dependent on a network of electronic devices that supports a plethora of services, ranging from delivery of entertainment and news to maintenance of business records to filing of legal forms. This network provides a robust platform to handle all kinds of sensitive information at the personal, corporate, or ...
Mohammad Tehranipoor, Berk Sunar
openaire   +1 more source

LATENT: Leveraging Automated Test Pattern Generation for Hardware Trojan Detection

Asian Test Symposium
Due to the globalization of the semiconductor supply chain and the adoption of the zero trust model, hardware Trojan attacks pose significant security threats introduced by untrusted entities. Hardware Trojans relate to malicious modification of a design
Sudipta Paria   +3 more
semanticscholar   +1 more source

Hardware Trojan Detection

2011
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire   +1 more source

Survey of Recent Developments for Hardware Trojan Detection

International Symposium on Circuits and Systems, 2021
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe threat to our critical infrastructures as an adversary can exploit them by bypassing the security features by activating a hardware Trojan.
Ayush Jain, Ziqi Zhou, Ujjwal Guin
semanticscholar   +1 more source

Countermeasures Against Hardware Trojans

2020
This section is essentially a systematized review of the results of studies dedicated to methods of counteracting hardware Trojans in microcircuits. It should be said from the very beginning that there are no such countermeasures that would ensure absolute protection from such threats.
Anatoly Belous, Vitali Saladukha
openaire   +1 more source

Deep Learning Based Graph Neural Network Technique for Hardware Trojan Detection at Register Transfer Level

2024 IEEE 4th International Conference on VLSI Systems, Architecture, Technology and Applications (VLSI SATA)
The presence of Hardware Trojans (HTs) poses a significant risk to the integrity and security of integrated circuits (ICs), as they can compromise the functionality and reliability of electronic systems.
Anindita Chattopadhyay   +4 more
semanticscholar   +1 more source

A Hardware Trojan Detection Method for Gate-Level Netlists Employing the CAMELOT Measure

IEEE International Conference on Distributed Computing Systems
Nowadays, hardware designs are at an all-time high demand which has forced manufacturers to procure intellectual property from third-party vendors. Nevertheless, the third-party intellectual property can provide a route to major security concerns like ...
Priyadharshini M   +3 more
semanticscholar   +1 more source

Hardware Trojans in Microcircuits

2020
This chapter is an overview dedicated to detailed analysis of structures and mechanisms of operation of hardware Trojans in modern microcircuits. The beginning of the chapter describes theoretical basis of designing safe electronic equipment for critical applications and the first documented facts of detection of hardware Trojans in critical ...
Anatoly Belous, Vitali Saladukha
openaire   +1 more source

Home - About - Disclaimer - Privacy