Results 181 to 190 of about 817,598 (242)
Some of the next articles are maybe not open access.
GNN4TJ: Graph Neural Networks for Hardware Trojan Detection at Register Transfer Level
Design, Automation and Test in Europe, 2021The time to market pressure and resource constraints has pushed System-on-Chip (SoC) designers toward outsourcing the design and using third-party Intellectual Property (IP). It has created an opportunity for rogue entities in the Integrated Circuit (IC)
Rozhin Yasaei, Shi Yu, M. A. Faruque
semanticscholar +1 more source
Hardware Trojan Detection using Unsupervised Machine Learning Algorithms in the Gate-level Netlist
IEEE International Conference on Electronics, Computing and Communication TechnologiesNow-a-days, the density of gates in VLSI circuits is rapidly increasing, it is becoming more difficult to detect malicious circuits. The malicious nets present in the circuit, named "hardware trojans," can be added in the pre-silicon and post-silicon ...
Karthikeyan S, Prabhu E
semanticscholar +1 more source
2010
Over the last two decades we have become dependent on a network of electronic devices that supports a plethora of services, ranging from delivery of entertainment and news to maintenance of business records to filing of legal forms. This network provides a robust platform to handle all kinds of sensitive information at the personal, corporate, or ...
Mohammad Tehranipoor, Berk Sunar
openaire +1 more source
Over the last two decades we have become dependent on a network of electronic devices that supports a plethora of services, ranging from delivery of entertainment and news to maintenance of business records to filing of legal forms. This network provides a robust platform to handle all kinds of sensitive information at the personal, corporate, or ...
Mohammad Tehranipoor, Berk Sunar
openaire +1 more source
LATENT: Leveraging Automated Test Pattern Generation for Hardware Trojan Detection
Asian Test SymposiumDue to the globalization of the semiconductor supply chain and the adoption of the zero trust model, hardware Trojan attacks pose significant security threats introduced by untrusted entities. Hardware Trojans relate to malicious modification of a design
Sudipta Paria +3 more
semanticscholar +1 more source
2011
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire +1 more source
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire +1 more source
Survey of Recent Developments for Hardware Trojan Detection
International Symposium on Circuits and Systems, 2021The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe threat to our critical infrastructures as an adversary can exploit them by bypassing the security features by activating a hardware Trojan.
Ayush Jain, Ziqi Zhou, Ujjwal Guin
semanticscholar +1 more source
Countermeasures Against Hardware Trojans
2020This section is essentially a systematized review of the results of studies dedicated to methods of counteracting hardware Trojans in microcircuits. It should be said from the very beginning that there are no such countermeasures that would ensure absolute protection from such threats.
Anatoly Belous, Vitali Saladukha
openaire +1 more source
2024 IEEE 4th International Conference on VLSI Systems, Architecture, Technology and Applications (VLSI SATA)
The presence of Hardware Trojans (HTs) poses a significant risk to the integrity and security of integrated circuits (ICs), as they can compromise the functionality and reliability of electronic systems.
Anindita Chattopadhyay +4 more
semanticscholar +1 more source
The presence of Hardware Trojans (HTs) poses a significant risk to the integrity and security of integrated circuits (ICs), as they can compromise the functionality and reliability of electronic systems.
Anindita Chattopadhyay +4 more
semanticscholar +1 more source
A Hardware Trojan Detection Method for Gate-Level Netlists Employing the CAMELOT Measure
IEEE International Conference on Distributed Computing SystemsNowadays, hardware designs are at an all-time high demand which has forced manufacturers to procure intellectual property from third-party vendors. Nevertheless, the third-party intellectual property can provide a route to major security concerns like ...
Priyadharshini M +3 more
semanticscholar +1 more source
Hardware Trojans in Microcircuits
2020This chapter is an overview dedicated to detailed analysis of structures and mechanisms of operation of hardware Trojans in modern microcircuits. The beginning of the chapter describes theoretical basis of designing safe electronic equipment for critical applications and the first documented facts of detection of hardware Trojans in critical ...
Anatoly Belous, Vitali Saladukha
openaire +1 more source

