Results 191 to 200 of about 817,598 (242)
Some of the next articles are maybe not open access.

Trustworthy Hardware: Identifying and Classifying Hardware Trojans

Computer, 2010
For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
Ramesh Karri   +3 more
openaire   +1 more source

Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelity

IEEE Symposium on Security and Privacy
Due to the escalating complexity of chip design and the exorbitant cost of building cutting-edge manufacturing facilities, outsourcing the fabrication of Integrated Circuits (ICs) is prevalent in modern semiconductor industry.
Xinming Wei, Jiaxi Zhang, Guojie Luo
semanticscholar   +1 more source

Unleashing GHOST: An LLM-Powered Framework for Automated Hardware Trojan Design

arXiv.org
Traditionally, inserting realistic Hardware Trojans (HTs) into complex hardware systems has been a time-consuming and manual process, requiring comprehensive knowledge of the design and navigating intricate Hardware Description Language (HDL) codebases ...
Md Omar Faruque   +3 more
semanticscholar   +1 more source

Towards Hardware Trojan: Problem Analysis and Trojan Simulation

2010 2nd International Conference on Information Engineering and Computer Science, 2010
Similar to the software viruses, hardware Trojan can also do harm to electronic systems. Specially, in military and defense-related systems, hardware security problem is an important aspect in these applications. In this paper, we analyze characteristics of hardware Trojans and implement three hardware Trojans on our hardware Trojan simulation platform
Song Yun   +3 more
openaire   +1 more source

AI Trojan Attack for Evading Machine Learning-Based Detection of Hardware Trojans

IEEE transactions on computers
The globalized semiconductor supply chain significantly increases the risk of exposing System-on-Chip (SoC) designs to hardware Trojans. While machine learning (ML) based Trojan detection approaches are promising due to their scalability as well as ...
Zhixin Pan, P. Mishra
semanticscholar   +1 more source

Hardware Trojan vulnerability

2018
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single ...
openaire   +2 more sources

Hardware Trojans in Electronic Devices

2020
This chapter is a review of well-known hardware Trojans designed in order to be implemented into various electronic devices. Hardware and software Trojans in telecommunication systems (network equipment, firewalls routers, work servers, wireless works, and even operator workstations) are considered.
Anatoly Belous, Vitali Saladukha
openaire   +1 more source

Hardware Trojans

2022
Dominik Sisejkovic, Rainer Leupers
openaire   +1 more source

Hardware-Trojaner

Datenschutz und Datensicherheit - DuD, 2020
Julian Speith   +4 more
openaire   +1 more source

The Hardware Trojan System: An Online Suite of Tools for Hardware Trojan Analysis

2017
Hardware trojans are accidental or malicious modifications of integrated circuits. There is currently no accepted standard for describing trojans or the methods used to detect them. A taxonomic structure was recently proposed that is a viable candidate for standardization.
Nicholas Houghton   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy