Results 31 to 40 of about 817,598 (242)

Hardware Trojan Detection Method Based on Hidden Markov Model [PDF]

open access: yesJisuanji gongcheng, 2016
Hardware Trojan causes a huge threat to the reliability of the integrated circuit chips,so this paper proposes a Trojan detection method based on Hidden Markov Model(HMM).It extracts the characteristic parameters of original circuit data,trains the ...
GAO Zhenbin,BAI Xue,YANG Song,HE Jiaji
doaj   +1 more source

Hardware Trojan Detection and High-Precision Localization in NoC-based MPSoC using Machine learning

open access: yesAsia and South Pacific Design Automation Conference, 2023
Networks-on-Chips (NoC) based Multi-Processor System-on-Chip (MPSoC) are increasingly employed in industrial and consumer elec-tronics. Outsourcing third-party IPs (3PIPs) and tools in NoC-based MPSoC is a prevalent development way in most fabless ...
Haoyu Wang, Basel Halak
semanticscholar   +1 more source

Hardware Trojan Detection Using Graph Neural Networks [PDF]

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2022
The globalization of the integrated circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities around the world.
Rozhin Yasaei   +3 more
semanticscholar   +1 more source

Data Augmented Hardware Trojan Detection Using Label Spreading Algorithm Based Transductive Learning for Edge Computing-Assisted IoT Devices

open access: yesIEEE Access, 2022
IoT devices handle a large amount of information including sensitive information pertaining to the deployed application. Such a scenario, makes IoT devices susceptible to various attacks.
Vaishnavi Sankar   +2 more
doaj   +1 more source

Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection [PDF]

open access: yes2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD), 2023
As the semiconductor industry has shifted to a fabless paradigm, the risk of hardware Trojans being inserted at various stages of production has also increased.
Rahul Vishwakarma, Amin Rezaei
semanticscholar   +1 more source

Research on hardware Trojan defense

open access: yes网络与信息安全学报, 2017
The definition and features of hardware Trojan were described firstly.After that,recent researches of defense and detection techniques were categorized with complete comparison and analysis.Then,current researches limitations were discussed based on the ...
Kan WANG   +3 more
doaj   +3 more sources

Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study

open access: yesIEEE Access, 2022
The integrated circuit (IC) ecosystem, today, is widely distributed. Usually, a handful of companies is involved in the development of a single chip – an environment that presents many opportunities for malicious activities such as the insertion ...
Felipe Almeida   +3 more
doaj   +1 more source

R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training [PDF]

open access: yesIEEE transactions on computers, 2022
Hardware Trojans (HTs) have become a serious problem, and extermination of them is strongly required for enhancing the security and safety of integrated circuits. An effective solution is to identify HTs at the gate level via machine learning techniques.
Kento Hasegawa   +4 more
semanticscholar   +1 more source

Scalable Hardware Trojan Diagnosis [PDF]

open access: yesIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2012
Hardware Trojans (HTs) pose a significant threat to the modern and pending integrated circuit (IC). Due to the diversity of HTs and intrinsic process variation (PV) in IC design, detecting and locating HTs is challenging. Several approaches have been proposed to address the problem, but they are either incapable of detecting various types of HTs or ...
Sheng Wei, Miodrag Potkonjak
openaire   +1 more source

Hardware trojan detection based on the optimized SVM algorithm

open access: yesDianzi Jishu Yingyong, 2018
The main research direction of hardware trojan detection is based on the side channel analysis. This paper proposes an optimized support vector machine(SVM) classification method to improve the accuracy and speed when analyzing the data for detection ...
Zhang Lei   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy