Results 61 to 70 of about 17,728 (178)

Golden Chip-Free Hardware Trojan Detection Using Attention-Based Non-Local Convolution With Simple Recurrent Unit

open access: yesIEEE Access
The globalization of the semiconductor industry introduces vulnerabilities like hardware Trojans that compromise hardware security and pose serious risks to critical applications such as military and medical systems. Traditional hardware Trojan detection
Rama Devi Maddineni, Deepak Ch
doaj   +1 more source

A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. [PDF]

open access: yesSensors (Basel), 2023
Dong C   +6 more
europepmc   +1 more source

Hardware Trojans detection based on projection pursuit

open access: yesTongxin xuebao, 2013
A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension ...
Peng ZHANG, Xin-cheng WANG, Qing ZHOU
doaj   +2 more sources

Threats and countermeasures for network security [PDF]

open access: yes
In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors.
Denning, Peter J.
core   +1 more source

Hardware Trojans mitigation in MPSoCs

open access: yes, 2019
Multiprocessor System-on-Chip (MPSoC) has become necessary due to the billions of transistors available to the designer, the need for fast design turnaround times, and the power wall. Thus, present embedded systems are designed with MPSoCs, and one possible way MPSoCs can be realized is through Pipelined MPSoC (PMPSoC) architectures, which are used in ...
openaire   +3 more sources

TAMIS: Golden-Model-Free EM Trojan Detection via Temperature-Aware Multi-Instance Segmentation and Clustering

open access: yesIEEE Access
We present a Golden-Model-free framework for hardware Trojan (HT) detection that treats temperature not as noise to remove but as physical context that organizes electromagnetic (EM) variability.
Daehyeon Lee   +3 more
doaj   +1 more source

Hardware Trojan Detection in Open-Source Hardware Designs Using Machine Learning

open access: yesIEEE Access
The globalization of the hardware supply chain reduces costs but increases security challenges with the potential insertion of hardware trojans by third parties.
Victor Takashi Hayashi   +1 more
doaj   +1 more source

A neural network framework based on ConvNeXt for side-channel hardware Trojan detection

open access: yesETRI Journal
Researchers in the field of hardware security have been dedicated to the study of hardware Trojan detection. Among the various approaches, side-channel detection methods are widely used because of their high detection accuracy and fewer constraints ...
Yuchan Gao   +4 more
doaj   +1 more source

X-Attack 2.0: The Risk of Power Wasters and Satisfiability Don’t-Care Hardware Trojans to Shared Cloud FPGAs

open access: yesIEEE Access
Cloud computing environments increasingly provision field-programmable gate arrays (FPGAs) for their programmability and hardware-level parallelism. While FPGAs are typically used by one tenant at a time, multitenant schemes supporting spatial sharing of
Dina G. Mahmoud   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy