Results 61 to 70 of about 17,728 (178)
The globalization of the semiconductor industry introduces vulnerabilities like hardware Trojans that compromise hardware security and pose serious risks to critical applications such as military and medical systems. Traditional hardware Trojan detection
Rama Devi Maddineni, Deepak Ch
doaj +1 more source
A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. [PDF]
Dong C +6 more
europepmc +1 more source
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs. [PDF]
Ali L, Farshad.
europepmc +1 more source
Hardware Trojans detection based on projection pursuit
A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension ...
Peng ZHANG, Xin-cheng WANG, Qing ZHOU
doaj +2 more sources
Threats and countermeasures for network security [PDF]
In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors.
Denning, Peter J.
core +1 more source
Hardware Trojans mitigation in MPSoCs
Multiprocessor System-on-Chip (MPSoC) has become necessary due to the billions of transistors available to the designer, the need for fast design turnaround times, and the power wall. Thus, present embedded systems are designed with MPSoCs, and one possible way MPSoCs can be realized is through Pipelined MPSoC (PMPSoC) architectures, which are used in ...
openaire +3 more sources
We present a Golden-Model-free framework for hardware Trojan (HT) detection that treats temperature not as noise to remove but as physical context that organizes electromagnetic (EM) variability.
Daehyeon Lee +3 more
doaj +1 more source
Hardware Trojan Detection in Open-Source Hardware Designs Using Machine Learning
The globalization of the hardware supply chain reduces costs but increases security challenges with the potential insertion of hardware trojans by third parties.
Victor Takashi Hayashi +1 more
doaj +1 more source
A neural network framework based on ConvNeXt for side-channel hardware Trojan detection
Researchers in the field of hardware security have been dedicated to the study of hardware Trojan detection. Among the various approaches, side-channel detection methods are widely used because of their high detection accuracy and fewer constraints ...
Yuchan Gao +4 more
doaj +1 more source
Cloud computing environments increasingly provision field-programmable gate arrays (FPGAs) for their programmability and hardware-level parallelism. While FPGAs are typically used by one tenant at a time, multitenant schemes supporting spatial sharing of
Dina G. Mahmoud +4 more
doaj +1 more source

