Results 21 to 30 of about 817,598 (242)
With the globalization of the integrated circuit industry, hardware Trojan is becoming the main threat to integrated circuits. At present, the side-channel analysis which can make a good trade-off between detection ability and cost, has attracted more ...
TANG Yongkang, HU Xing, SU Ting, LI Shaoqing
doaj +3 more sources
Design and detection of hardware Trojan based on satisfiability don't cares
Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.
WU Lingjuan +1 more
doaj +3 more sources
IMPLEMENTATION OF A HARDWARE TROJAN CHIP DETECTOR MODEL USING ARDUINO MICROCONTROLLER [PDF]
These days, hardware devices and its associated activities are greatly impacted by threats amidst of various technologies. Hardware trojans are malicious modifications made to the circuitry of an integrated circuit, Exploiting such alterations and ...
Kadeejah ABDULSALAM +2 more
doaj +1 more source
TrojanSAINT: Gate-Level Netlist Sampling-Based Inductive Learning for Hardware Trojan Detection [PDF]
We propose TrojanSAINT, a graph neural network (GNN)-based hardware Trojan (HT) detection scheme working at the gate level. Unlike prior GNN-based art, TrojanSAINT enables both pre-/post-silicon HT detection.
Hazem Lashen +3 more
semanticscholar +1 more source
Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties) pose major security concerns, especially ...
K. Xiao +5 more
openaire +2 more sources
Hardware Trojan Detection Based on Long Short-Term Memory Neural Network [PDF]
Hardware Trojans pose a huge threat to the reliability of integrated circuit chips.Therefore,this paper proposes a hardware Trojan detection method based on Principal Component Analysis(PCA) and Long Short-Term Memory(LSTM) neural network.The method uses
HU Tao, DIAN Songyi, JIANG Ronghua
doaj +1 more source
Hardware Trojan Detection Based on Improved Euclidean Distance [PDF]
The accuracy of the hardware Trojan detection method based on the traditional Euclidean distance discrimination is too low to meet the demand.For this reason,the side-channel power consumption information is collected and analized in this paper,and an ...
WANG Jianxin,WANG Boren,QU Ming,ZHANG Lei
doaj +1 more source
Hardware Trojan Detection Using Machine Learning: A Tutorial
With the growth and globalization of IC design and development, there is an increase in the number of Designers and Design houses. As setting up a fabrication facility may easily cost upwards of $20 billion, costs for advanced nodes may be even greater ...
Kevin Immanuel Gubbi +9 more
semanticscholar +1 more source
Creation and detection of hardware trojans using non-invasive off-the-shelf technologies [PDF]
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans.
Bellekens, Xavier +2 more
core +5 more sources
The ageing phenomenon of negative bias temperature instability (NBTI) continues to challenge the dynamic thermal management of modern FPGAs. Increased transistor density leads to thermal accumulation and propagates higher and non-uniform temperature ...
Sohaib Aslam +4 more
doaj +1 more source

