Results 191 to 200 of about 817,598 (242)
Some of the next articles are maybe not open access.
Trustworthy Hardware: Identifying and Classifying Hardware Trojans
Computer, 2010For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
Ramesh Karri +3 more
openaire +1 more source
IEEE Symposium on Security and Privacy
Due to the escalating complexity of chip design and the exorbitant cost of building cutting-edge manufacturing facilities, outsourcing the fabrication of Integrated Circuits (ICs) is prevalent in modern semiconductor industry.
Xinming Wei, Jiaxi Zhang, Guojie Luo
semanticscholar +1 more source
Due to the escalating complexity of chip design and the exorbitant cost of building cutting-edge manufacturing facilities, outsourcing the fabrication of Integrated Circuits (ICs) is prevalent in modern semiconductor industry.
Xinming Wei, Jiaxi Zhang, Guojie Luo
semanticscholar +1 more source
Unleashing GHOST: An LLM-Powered Framework for Automated Hardware Trojan Design
arXiv.orgTraditionally, inserting realistic Hardware Trojans (HTs) into complex hardware systems has been a time-consuming and manual process, requiring comprehensive knowledge of the design and navigating intricate Hardware Description Language (HDL) codebases ...
Md Omar Faruque +3 more
semanticscholar +1 more source
Towards Hardware Trojan: Problem Analysis and Trojan Simulation
2010 2nd International Conference on Information Engineering and Computer Science, 2010Similar to the software viruses, hardware Trojan can also do harm to electronic systems. Specially, in military and defense-related systems, hardware security problem is an important aspect in these applications. In this paper, we analyze characteristics of hardware Trojans and implement three hardware Trojans on our hardware Trojan simulation platform
Song Yun +3 more
openaire +1 more source
AI Trojan Attack for Evading Machine Learning-Based Detection of Hardware Trojans
IEEE transactions on computersThe globalized semiconductor supply chain significantly increases the risk of exposing System-on-Chip (SoC) designs to hardware Trojans. While machine learning (ML) based Trojan detection approaches are promising due to their scalability as well as ...
Zhixin Pan, P. Mishra
semanticscholar +1 more source
2018
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single ...
openaire +2 more sources
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single ...
openaire +2 more sources
Hardware Trojans in Electronic Devices
2020This chapter is a review of well-known hardware Trojans designed in order to be implemented into various electronic devices. Hardware and software Trojans in telecommunication systems (network equipment, firewalls routers, work servers, wireless works, and even operator workstations) are considered.
Anatoly Belous, Vitali Saladukha
openaire +1 more source
The Hardware Trojan System: An Online Suite of Tools for Hardware Trojan Analysis
2017Hardware trojans are accidental or malicious modifications of integrated circuits. There is currently no accepted standard for describing trojans or the methods used to detect them. A taxonomic structure was recently proposed that is a viable candidate for standardization.
Nicholas Houghton +3 more
openaire +1 more source

