Results 31 to 40 of about 17,728 (178)

Hybrid multi‐level hardware Trojan detection platform for gate‐level netlists based on XGBoost

open access: yesIET Computers & Digital Techniques, 2022
Coping with the problem of malicious third‐party vendors implanting Hardware Trojan (HT) in the circuit design stage, this paper proposes a hybrid‐mode gate‐level hardware Trojan detection platform based on the XGBoost algorithm.
Ying Zhang   +6 more
doaj   +1 more source

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

Invisible Trojan-horse attack [PDF]

open access: yes, 2017
We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique.
Jain, Nitin   +3 more
core   +2 more sources

Hardware Trojan Detection through Information Flow Security Verification

open access: yes, 2017
Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints.
Contreras, Gustavo   +5 more
core   +1 more source

Hardware Trojan Identification and Detection

open access: yesInternational Journal on Cryptography and Information Security, 2017
ABSTRACT The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques.
Moein, Samer   +3 more
openaire   +1 more source

Gate-Level Hardware Trojan Detection Method for Graph Neural Networks Based on Controllability Metrics [PDF]

open access: yesJisuanji gongcheng
With the continuous increase in globalization, third-party Intellectual Property (IP) core applications have become increasingly widespread. The gradual maturity of hardware Trojan attack technology enables the implantation of hardware Trojan in the chip
Yang ZHANG, Chang LIU, Shaoqing LI
doaj   +1 more source

Research on Influencing Factor of Hardware Trojan Side-channel Detection Method [PDF]

open access: yesJisuanji gongcheng, 2019
The side-channel detection method screens the hardware Trojan circuit by collecting physical parameters such as power consumption,delay,and electromagnetic field,but its detection performance is seriously affected by process fluctuation,and process ...
LI Ying,CHEN Lan,ZHOU Yinhao
doaj   +1 more source

A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things

open access: yesInternational Journal of Distributed Sensor Networks, 2019
With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things.
Chen Dong   +3 more
doaj   +1 more source

Trojans in Early Design Steps—An Emerging Threat [PDF]

open access: yes, 2016
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T.   +2 more
core  

A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator

open access: yesCryptography
With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities.
Zichu Liu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy