Results 31 to 40 of about 817,598 (242)
Hardware Trojan Detection Method Based on Hidden Markov Model [PDF]
Hardware Trojan causes a huge threat to the reliability of the integrated circuit chips,so this paper proposes a Trojan detection method based on Hidden Markov Model(HMM).It extracts the characteristic parameters of original circuit data,trains the ...
GAO Zhenbin,BAI Xue,YANG Song,HE Jiaji
doaj +1 more source
Hardware Trojan Detection and High-Precision Localization in NoC-based MPSoC using Machine learning
Networks-on-Chips (NoC) based Multi-Processor System-on-Chip (MPSoC) are increasingly employed in industrial and consumer elec-tronics. Outsourcing third-party IPs (3PIPs) and tools in NoC-based MPSoC is a prevalent development way in most fabless ...
Haoyu Wang, Basel Halak
semanticscholar +1 more source
Hardware Trojan Detection Using Graph Neural Networks [PDF]
The globalization of the integrated circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities around the world.
Rozhin Yasaei +3 more
semanticscholar +1 more source
IoT devices handle a large amount of information including sensitive information pertaining to the deployed application. Such a scenario, makes IoT devices susceptible to various attacks.
Vaishnavi Sankar +2 more
doaj +1 more source
Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection [PDF]
As the semiconductor industry has shifted to a fabless paradigm, the risk of hardware Trojans being inserted at various stages of production has also increased.
Rahul Vishwakarma, Amin Rezaei
semanticscholar +1 more source
Research on hardware Trojan defense
The definition and features of hardware Trojan were described firstly.After that,recent researches of defense and detection techniques were categorized with complete comparison and analysis.Then,current researches limitations were discussed based on the ...
Kan WANG +3 more
doaj +3 more sources
Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study
The integrated circuit (IC) ecosystem, today, is widely distributed. Usually, a handful of companies is involved in the development of a single chip – an environment that presents many opportunities for malicious activities such as the insertion ...
Felipe Almeida +3 more
doaj +1 more source
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training [PDF]
Hardware Trojans (HTs) have become a serious problem, and extermination of them is strongly required for enhancing the security and safety of integrated circuits. An effective solution is to identify HTs at the gate level via machine learning techniques.
Kento Hasegawa +4 more
semanticscholar +1 more source
Scalable Hardware Trojan Diagnosis [PDF]
Hardware Trojans (HTs) pose a significant threat to the modern and pending integrated circuit (IC). Due to the diversity of HTs and intrinsic process variation (PV) in IC design, detecting and locating HTs is challenging. Several approaches have been proposed to address the problem, but they are either incapable of detecting various types of HTs or ...
Sheng Wei, Miodrag Potkonjak
openaire +1 more source
Hardware trojan detection based on the optimized SVM algorithm
The main research direction of hardware trojan detection is based on the side channel analysis. This paper proposes an optimized support vector machine(SVM) classification method to improve the accuracy and speed when analyzing the data for detection ...
Zhang Lei +3 more
doaj +1 more source

