Results 141 to 150 of about 9,568 (196)
Some of the next articles are maybe not open access.

Can Overclocking Detect Hardware Trojans?

2021 IEEE International Symposium on Circuits and Systems (ISCAS), 2021
Hardware Trojans can take various forms to manifest an integrated circuit (IC), causing altered functional behavior, and potential critical consequences, e.g., leaking secret information in encryption applications. This paper presents an approach that uses over-clocking to produce different bit flip patterns between clean design and Trojan-inserted ...
Xingyu Meng   +3 more
openaire   +1 more source

Hardware Trojan Detection using Ring Oscillator

2021 6th International Conference on Communication and Electronics Systems (ICCES), 2021
Hardware Trojans are malicious modules causing vulnerabilities in designs. Secured hardware designs are desirable in almost all applications. So, it is important to make a trustworthy design that actually exposes malfunctions when a Trojan is present in it.
Deepthi S, Ramesh S. R, Nirmala Devi M
openaire   +1 more source

Genetic Algorithm based Hardware Trojan Detection

2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), 2021
There is an increasing concern about possible hostile modification done to ICs, which are used in various critical applications. Such malicious modifications are referred to as Hardware Trojan. A novel procedure to detect these malicious Trojans using Genetic algorithm along with the logical masking technique which masks the Trojan module when embedded
Ch Sai Sruthi   +5 more
openaire   +1 more source

Hardware trojan design and detection

Proceedings of the Workshop on Embedded Systems Security, 2013
Hardware Trojan design and detection have been extensively studied during the last years. In this work we investigate non-invasive detection methods utilizing so-called side-channel analysis. In the past, almost all proposed detection techniques have been evaluated based on simulations only and thus, the question remains how well they perform in ...
Sebastian Kutzner   +2 more
openaire   +1 more source

Hardware Trojan Detection Based on SRC

2020 35th Youth Academic Annual Conference of Chinese Association of Automation (YAC), 2020
The security of integrated circuits (IC) plays a very significant role on military, economy, communication and other industries. Due to the globalization of the integrated circuit (IC) from design to manufacturing process, the IC chip is vulnerable to be implanted malicious circuit, which is known as hardware Trojan (HT).
Chen Sun   +3 more
openaire   +1 more source

Hardware Trojan Detection

2011
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire   +1 more source

Towards a Hardware Trojan Detection Cycle

2014 Ninth International Conference on Availability, Reliability and Security, 2014
Intentionally inserted malfunctions in integrated circuits, referred to as Hardware Trojans, have become an emerging threat. Recently, the scientific community started to propose technical approaches to mitigate the threat of unspecified and potentially malicious functionality.
Adrian Dabrowski   +4 more
openaire   +1 more source

Hardware Trojan detection via rewriting logic

Journal of Logical and Algebraic Methods in Programming, 2022
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Asăvoae, Irina Măriuca   +3 more
openaire   +2 more sources

Hard to Detect Combinational Hardware Trojans

2018 8th International Symposium on Embedded Computing and System Design (ISED), 2018
Hardware Trojan (HT), caused by outsiders, modifies fabrication of a golden IC and avoids normal testing. The alteration by an HT targets disabling the main function of the IC or degrades signal integrity. Most vulnerable HTs are even designed to break hardware security.
Nilanjana Das   +2 more
openaire   +1 more source

Nonlinear analysis for hardware Trojan detection

2015 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), 2015
As an important content of chip security, Hardware Trojan detection has attracted a lot of attention. The existing Hardware Trojan detection methods based on side-channel power consumption are effective. The main existing Hardware Trojan detection methods based on side-channel power consumption analysis mainly concentrate on linear features but ignore ...
Errui Zhou   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy