Results 1 to 10 of about 9,568 (196)

A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection [PDF]

open access: yesSensors, 2023
The Cyber-Physical System and even the Metaverse will become the second space in which human beings live. While bringing convenience to human beings, it also brings many security threats. These threats may come from software or hardware. There has been a
Chen Dong   +6 more
doaj   +2 more sources

System-level protection and hardware Trojan detection using weighted voting [PDF]

open access: yesJournal of Advanced Research, 2014
The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during ...
Hany A.M. Amin   +2 more
doaj   +2 more sources

Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a Physically Unclonable Function-Based Countermeasure Detection Technique [PDF]

open access: yesMicromachines
Convolutional neural networks (CNNs) have demonstrated significant superiority in modern artificial intelligence (AI) applications. To accelerate the inference process of CNNs, reconfigurable CNN accelerators that support diverse networks are widely ...
Jia Hou   +3 more
doaj   +2 more sources

Hardware Trojan Detection through Information Flow Security Verification [PDF]

open access: yes2017 IEEE International Test Conference (ITC), 2017
Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints.
Contreras, Gustavo   +5 more
core   +2 more sources

A framework for hardware trojan detection based on contrastive learning [PDF]

open access: yesScientific Reports
With the rapid development of the semiconductor industry, Hardware Trojans (HT) as a kind of malicious function that can be implanted at will in all processes of integrated circuit design, manufacturing, and deployment have become a great threat in the ...
Zijing Jiang, Qun Ding
doaj   +2 more sources

Survey on model checking based hardware Trojan detection technology

open access: yes网络与信息安全学报, 2021
Hardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit.In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed.As one of ...
Qizhi ZHANG   +3 more
doaj   +3 more sources

Research on electromagnetic radiation based side-channel analysis method for hardware Trojan detection

open access: yes网络与信息安全学报, 2021
With the globalization of the integrated circuit industry, hardware Trojan is becoming the main threat to integrated circuits. At present, the side-channel analysis which can make a good trade-off between detection ability and cost, has attracted more ...
TANG Yongkang, HU Xing, SU Ting, LI Shaoqing
doaj   +3 more sources

Implantation and Detection of a Sequential Bus Hardware Trojan [PDF]

open access: yesJisuanji gongcheng, 2021
RS bus integrated circuit has been widely used in aerospace and industrial control.With the hardware Trojan detection for integrated circuits becoming a research hotspot,as a branch of bus hardware Trojan research field,its design has been paid more and ...
HUANG Jiaoying, LI Shengyu, GAO Cheng, YANG Daming
doaj   +1 more source

SMART HARDWARE TROJAN DETECTION SYSTEM

open access: yes, 2022
The IoT has become an indispensable part of our lives at work and in our home applications. Due to the need for many IoT devices, IoT manufacturers are least concerned about security vulnerabilities during designing and developing these devices. Because of this, it becomes easier for adversaries to manipulate the hardware and insert Trojans or Remote ...
Alkhazendar, Iyad   +2 more
openaire   +4 more sources

Data Augmented Hardware Trojan Detection Using Label Spreading Algorithm Based Transductive Learning for Edge Computing-Assisted IoT Devices

open access: yesIEEE Access, 2022
IoT devices handle a large amount of information including sensitive information pertaining to the deployed application. Such a scenario, makes IoT devices susceptible to various attacks.
Vaishnavi Sankar   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy