Results 41 to 50 of about 817,598 (242)
Node-Wise Hardware Trojan Detection Based on Graph Learning [PDF]
In the fourth industrial revolution, securing the protection of supply chains has become an ever-growing concern. One such cyber threat is a hardware Trojan (HT), a malicious modification to an IC.
Kento Hasegawa +5 more
semanticscholar +1 more source
Hardware Trojan (HT) is the most critical threat due to outsourcing of Integrated circuit designing phases. Existing machine learning-based HT detection techniques at the pre-silicon IC phase use the structural or SCOAP gate-level netlist features for ...
Richa Sharma +3 more
semanticscholar +1 more source
Due to the globalization of the design and fabrication process of integrated circuits (ICs), ICs are becoming vulnerable to hardware Trojans. Most of the existing hardware Trojan detection works assume that the testing stage is trustworthy.
Mingfu Xue +3 more
doaj +1 more source
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning [PDF]
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can bypass the security of critical infrastructures. Although researchers have proposed many techniques to detect HTs, several critical limitations exist, including ...
Vasudev Gohil +3 more
semanticscholar +1 more source
This paper deals with a safety problem of entropy sources in deterministic random bit generators. An initialization input attack on a set of two pseudo-random generators using analog-digital hardware Trojan is presented.
Michal Melosik, Wieslaw Marszalek
doaj +1 more source
Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images [PDF]
This article presents a method for hardware trojan detection in integrated circuits. Unsupervised deep learning is used to classify wide field-of-view (4 × 4 mm2), high spatial resolution magnetic field images taken using a Quantum Diamond Microscope ...
Maitreyi Ashok +4 more
semanticscholar +1 more source
Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction ...
Sarwono Sutikno +3 more
doaj +1 more source
Hardware Trojans are usually implanted by making malicious changes to a chip circuit, which can destroy chip functions or expose sensitive information once activated.
Wenjing Tang, Jing Su, Yuchan Gao
semanticscholar +1 more source
A Survey on the Design, Detection, and Prevention of Pre-Silicon Hardware Trojans
The complexity of the semiconductor design lifecycle and globalized manufacturing process creates concern over the threat of deliberate malicious alterations, or hardware Trojans, being inserted into microelectronic designs.
Jonathan Cruz, Jason Hamlet
doaj +1 more source
Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems
Internet of Things (IoT) and Cyber-Physical Systems (CPS) have profoundly influenced the way individuals and enterprises interact with the world. Although attacks on IoT devices are becoming more commonplace, security metrics often focus on software ...
Anju P. Johnson +2 more
doaj +1 more source

