Results 21 to 30 of about 17,728 (178)

Research on hardware Trojan defense

open access: yes网络与信息安全学报, 2017
The definition and features of hardware Trojan were described firstly.After that,recent researches of defense and detection techniques were categorized with complete comparison and analysis.Then,current researches limitations were discussed based on the ...
Kan WANG   +3 more
doaj   +3 more sources

Data Augmented Hardware Trojan Detection Using Label Spreading Algorithm Based Transductive Learning for Edge Computing-Assisted IoT Devices

open access: yesIEEE Access, 2022
IoT devices handle a large amount of information including sensitive information pertaining to the deployed application. Such a scenario, makes IoT devices susceptible to various attacks.
Vaishnavi Sankar   +2 more
doaj   +1 more source

Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study

open access: yesIEEE Access, 2022
The integrated circuit (IC) ecosystem, today, is widely distributed. Usually, a handful of companies is involved in the development of a single chip – an environment that presents many opportunities for malicious activities such as the insertion ...
Felipe Almeida   +3 more
doaj   +1 more source

Hardware trojan detection based on the optimized SVM algorithm

open access: yesDianzi Jishu Yingyong, 2018
The main research direction of hardware trojan detection is based on the side channel analysis. This paper proposes an optimized support vector machine(SVM) classification method to improve the accuracy and speed when analyzing the data for detection ...
Zhang Lei   +3 more
doaj   +1 more source

Case Study On Social Engineering Techniques for Persuasion [PDF]

open access: yes, 2010
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin   +2 more
core   +3 more sources

Trojan Attack on the Initialization of Pseudo-Random Bit Generators Using Synchronization of Chaotic Input Sources

open access: yesIEEE Access, 2021
This paper deals with a safety problem of entropy sources in deterministic random bit generators. An initialization input attack on a set of two pseudo-random generators using analog-digital hardware Trojan is presented.
Michal Melosik, Wieslaw Marszalek
doaj   +1 more source

Detecting Unknown Hardware Trojans in Register Transfer Level Leveraging Verilog Conditional Branching Features

open access: yesIEEE Access, 2023
Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction ...
Sarwono Sutikno   +3 more
doaj   +1 more source

Trojan-horse attacks threaten the security of practical quantum cryptography [PDF]

open access: yes, 2014
A quantum key distribution system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack.
Anisimova, Elena   +5 more
core   +3 more sources

A Survey on the Design, Detection, and Prevention of Pre-Silicon Hardware Trojans

open access: yesIEEE Access
The complexity of the semiconductor design lifecycle and globalized manufacturing process creates concern over the threat of deliberate malicious alterations, or hardware Trojans, being inserted into microelectronic designs.
Jonathan Cruz, Jason Hamlet
doaj   +1 more source

Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems

open access: yesSensors, 2020
Internet of Things (IoT) and Cyber-Physical Systems (CPS) have profoundly influenced the way individuals and enterprises interact with the world. Although attacks on IoT devices are becoming more commonplace, security metrics often focus on software ...
Anju P. Johnson   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy