A hardware Trojan attack protection method for CGRCA configuration bitstream
A protection method based on authentication and encryption hardware security engine is proposed as the reconfigurable device configuration bitstream is vulnerable to hardware Trojan attacks.
Liu Min, Yan Yingjian, Nan Longmei
doaj +1 more source
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones [PDF]
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites.
Crandall, David +3 more
core
Hardware Trojan Detection Using Controlled Circuit Aging
This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC.
Virinchi Roy Surabhi +6 more
doaj +1 more source
Design and analysis of hardware Trojans in approximate circuits
Approximate computing can accept errors in computation systems to achieve better utilisation of hardware resources. Approximate computing has been successfully developed in integrated circuits, such as approximate arithemtic circuits and approximate ...
Yuqin Dou +4 more
doaj +1 more source
Robust Hardware Trojan Detection Method by Unsupervised Learning of Electromagnetic Signals
This article explores the threat posed by Hardware Trojans (HTs), malicious circuits clandestinely embedded in hardware akin to software backdoors. Activation by attackers renders these Trojans capable of inducing malfunctions or leaking confidential ...
Daehyeon Lee +4 more
semanticscholar +1 more source
Deep Space Network Radio Science and Ground‐Based Planetary Radar in the Next Decade
Abstract The Deep Space Network (DSN) has been a core operational element of NASA's crewed and robotic exploration of the Solar System since the early 1960s. The primary role of the DSN has been to acquire telemetry and navigation data, but over the years, its radiometric and radar capabilities have expanded to form a system for obtaining unique ...
R. S. Park +13 more
wiley +1 more source
Soil to Sail - Asteroid Landers on Near-Term Sailcraft as an Evolution of the GOSSAMER Small Spacecraft Solar Sail Concept for In-Situ Characterization [PDF]
Any effort which intends to physically interact with specific asteroids requires understanding at least of the composition and multi-scale structure of the surface layers, sometimes also of the interior.
Boden, Ralf +12 more
core
Greening the Gulf? Renewables, Fossil Capitalism and the ‘East–East’ Axis of World Energy
ABSTRACT This article examines the place of the Gulf Cooperation Council states in the global energy transition, with a focus on the recent and rapid expansion of renewable energy in the region. It argues that much like at the global scale, the energy transition in the Gulf is an additive process, one that superimposes renewable energy on growing ...
Adam Hanieh
wiley +1 more source
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci +7 more
wiley +1 more source
PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties.
Junjun Huan +3 more
doaj +1 more source

