Results 11 to 20 of about 17,728 (178)

A New Characterization of Hardware Trojans

open access: yesIEEE Access, 2016
This paper examines hardware trojan threats to semiconductor chips, which is particularly important for chips intended for vital infrastructure and critical applications.
Samer Moein   +3 more
doaj   +2 more sources

Hardware Security in IoT Devices with Emphasis on Hardware Trojans [PDF]

open access: yesJournal of Sensor and Actuator Networks, 2019
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software ...
Simranjeet Sidhu   +2 more
doaj   +2 more sources

Hardware Trojans in Reconfigurable Computing [PDF]

open access: yes2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), 2021
Wettstreit zwischen der Entwicklung neuer Hardwaretrojaner und entsprechender Gegenmaßnahmen beschreiten Widersacher immer raffiniertere Wege um Schaltungsentwürfe zu infizieren und dabei selbst fortgeschrittene Test- und Verifikationsmethoden zu überlisten.
openaire   +3 more sources

Hardware Trojan with Frequency Modulation [PDF]

open access: yes2021 IEEE 12th Latin America Symposium on Circuits and System (LASCAS), 2021
The use of third-party IP cores in implementing applications in FPGAs has given rise to the threat of malicious alterations through the insertion of hardware Trojans. To address this threat, it is important to predict the way hardware Trojans are built and to identify their weaknesses.
Ash Luft, Mihai Sima, Michael McGuire
openaire   +2 more sources

Hardware Trojan Detection Based on Long Short-Term Memory Neural Network [PDF]

open access: yesJisuanji gongcheng, 2020
Hardware Trojans pose a huge threat to the reliability of integrated circuit chips.Therefore,this paper proposes a hardware Trojan detection method based on Principal Component Analysis(PCA) and Long Short-Term Memory(LSTM) neural network.The method uses
HU Tao, DIAN Songyi, JIANG Ronghua
doaj   +1 more source

Hardware Trojan Detection Based on Improved Euclidean Distance [PDF]

open access: yesJisuanji gongcheng, 2017
The accuracy of the hardware Trojan detection method based on the traditional Euclidean distance discrimination is too low to meet the demand.For this reason,the side-channel power consumption information is collected and analized in this paper,and an ...
WANG Jianxin,WANG Boren,QU Ming,ZHANG Lei
doaj   +1 more source

Creation and detection of hardware trojans using non-invasive off-the-shelf technologies [PDF]

open access: yes, 2018
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans.
Bellekens, Xavier   +2 more
core   +5 more sources

Hardware Trojan Detection Method Based on Hidden Markov Model [PDF]

open access: yesJisuanji gongcheng, 2016
Hardware Trojan causes a huge threat to the reliability of the integrated circuit chips,so this paper proposes a Trojan detection method based on Hidden Markov Model(HMM).It extracts the characteristic parameters of original circuit data,trains the ...
GAO Zhenbin,BAI Xue,YANG Song,HE Jiaji
doaj   +1 more source

Scalable Hardware Trojan Diagnosis [PDF]

open access: yesIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2012
Hardware Trojans (HTs) pose a significant threat to the modern and pending integrated circuit (IC). Due to the diversity of HTs and intrinsic process variation (PV) in IC design, detecting and locating HTs is challenging. Several approaches have been proposed to address the problem, but they are either incapable of detecting various types of HTs or ...
Sheng Wei 0001, Miodrag Potkonjak
openaire   +1 more source

Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric–Detection Methodology and Mitigation

open access: yesIEEE Access, 2020
The ageing phenomenon of negative bias temperature instability (NBTI) continues to challenge the dynamic thermal management of modern FPGAs. Increased transistor density leads to thermal accumulation and propagates higher and non-uniform temperature ...
Sohaib Aslam   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy