Results 71 to 80 of about 17,728 (178)

Hardware Trojan Design and Detection in Pre-Charge Half Buffer Asynchronous Circuits

open access: yesIEEE Access
The escalating landscape of cyber warfare has made the detection of hardware Trojans, malicious circuit components capable of leaking sensitive information, a critical research priority.
Chukwunalu Asuai   +3 more
doaj   +1 more source

MultiSAINT: Parallel Multi-Scale GNN for FPGA Hardware Trojan Detection

open access: yesIEEE Access
Hardware Trojan poses a critical threat to integrated circuit security, especially in Field Programmable Gate Arrays (FPGAs) where trojans can be embedded during the design and synthesis phases that produce gate-level netlists.
Indri Yanti   +2 more
doaj   +1 more source

Hardware Trojan Dataset of RISC-V and Web3 Generated with ChatGPT-4

open access: yesData
Although hardware trojans impose a relevant threat to the hardware security of RISC-V and Web3 applications, existing datasets have a limited set of examples, as the most famous hardware trojan dataset TrustHub has 106 different trojans.
Victor Takashi Hayashi   +1 more
doaj   +1 more source

Robust hardware Trojan detection leveraging dual-domain features and stacked ensemble learning

open access: yesCybersecurity
Cyber-physical systems rely on sensors, communication, and computing, all powered by integrated circuits (ICs). These ICs are vulnerable to malicious hardware attacks, with hardware Trojans being one of the stealthiest threats.
Sefatun-Noor Puspa   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy