Results 41 to 50 of about 17,728 (178)

Reusing Logic Masking to Facilitate Hardware Trojan Detection [PDF]

open access: yes, 2016
Hardware Trojan (HT) and Integrated Circuit (IC)/ Intellectual Property (IP) piracy are important threats which may happen in untrusted fabrication foundries.
Beroulle, Vincent   +2 more
core  

DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements [PDF]

open access: yes, 2012
Detecting Trojans in an integrated circuit (IC) is an important but hard problem. A Trojan is malicious hardware it can be extremely small in size and dormant until triggered by some unknown circuit state.
Gwon, Youngjune Lee   +2 more
core   +1 more source

Malware detection techniques for mobile devices

open access: yes, 2017
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core   +1 more source

Targeted modification of hardware trojans

open access: yesJournal of Hardware and Systems Security, 2019
The use of untrusted design tools, components, and designers, coupled with untrusted device fabrication, introduces the possibility of malicious modifications being made to integrated circuits (ICs) during their design and fabrication. These modifications are known as hardware trojans. The widespread use of commercially purchased 3rd party intellectual
Jason R. Hamlet   +2 more
openaire   +2 more sources

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]

open access: yes, 2017
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea   +5 more
core   +1 more source

Securing library information system: Vulnerabilities and threats [PDF]

open access: yes, 2010
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Husin, Mohd Zabidin   +3 more
core  

Only Aggressive Elephants are Fast Elephants

open access: yes, 2012
Yellow elephants are slow. A major reason is that they consume their inputs entirely before responding to an elephant rider's orders. Some clever riders have trained their yellow elephants to only consume parts of the inputs before responding.
Dittrich, Jens   +5 more
core   +1 more source

Soil to Sail - Asteroid Landers on Near-Term Sailcraft as an Evolution of the GOSSAMER Small Spacecraft Solar Sail Concept for In-Situ Characterization [PDF]

open access: yes, 2017
Any effort which intends to physically interact with specific asteroids requires understanding at least of the composition and multi-scale structure of the surface layers, sometimes also of the interior.
Boden, Ralf   +12 more
core  

CERT strategy to deal with phishing attacks

open access: yes, 2017
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core   +1 more source

A hardware Trojan attack protection method for CGRCA configuration bitstream

open access: yesDianzi Jishu Yingyong, 2019
A protection method based on authentication and encryption hardware security engine is proposed as the reconfigurable device configuration bitstream is vulnerable to hardware Trojan attacks.
Liu Min, Yan Yingjian, Nan Longmei
doaj   +1 more source

Home - About - Disclaimer - Privacy