Results 141 to 150 of about 9,568 (196)
Some of the next articles are maybe not open access.
Can Overclocking Detect Hardware Trojans?
2021 IEEE International Symposium on Circuits and Systems (ISCAS), 2021Hardware Trojans can take various forms to manifest an integrated circuit (IC), causing altered functional behavior, and potential critical consequences, e.g., leaking secret information in encryption applications. This paper presents an approach that uses over-clocking to produce different bit flip patterns between clean design and Trojan-inserted ...
Xingyu Meng +3 more
openaire +1 more source
Hardware Trojan Detection using Ring Oscillator
2021 6th International Conference on Communication and Electronics Systems (ICCES), 2021Hardware Trojans are malicious modules causing vulnerabilities in designs. Secured hardware designs are desirable in almost all applications. So, it is important to make a trustworthy design that actually exposes malfunctions when a Trojan is present in it.
Deepthi S, Ramesh S. R, Nirmala Devi M
openaire +1 more source
Genetic Algorithm based Hardware Trojan Detection
2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), 2021There is an increasing concern about possible hostile modification done to ICs, which are used in various critical applications. Such malicious modifications are referred to as Hardware Trojan. A novel procedure to detect these malicious Trojans using Genetic algorithm along with the logical masking technique which masks the Trojan module when embedded
Ch Sai Sruthi +5 more
openaire +1 more source
Hardware trojan design and detection
Proceedings of the Workshop on Embedded Systems Security, 2013Hardware Trojan design and detection have been extensively studied during the last years. In this work we investigate non-invasive detection methods utilizing so-called side-channel analysis. In the past, almost all proposed detection techniques have been evaluated based on simulations only and thus, the question remains how well they perform in ...
Sebastian Kutzner +2 more
openaire +1 more source
Hardware Trojan Detection Based on SRC
2020 35th Youth Academic Annual Conference of Chinese Association of Automation (YAC), 2020The security of integrated circuits (IC) plays a very significant role on military, economy, communication and other industries. Due to the globalization of the integrated circuit (IC) from design to manufacturing process, the IC chip is vulnerable to be implanted malicious circuit, which is known as hardware Trojan (HT).
Chen Sun +3 more
openaire +1 more source
2011
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire +1 more source
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire +1 more source
Towards a Hardware Trojan Detection Cycle
2014 Ninth International Conference on Availability, Reliability and Security, 2014Intentionally inserted malfunctions in integrated circuits, referred to as Hardware Trojans, have become an emerging threat. Recently, the scientific community started to propose technical approaches to mitigate the threat of unspecified and potentially malicious functionality.
Adrian Dabrowski +4 more
openaire +1 more source
Hardware Trojan detection via rewriting logic
Journal of Logical and Algebraic Methods in Programming, 2022zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Asăvoae, Irina Măriuca +3 more
openaire +2 more sources
Hard to Detect Combinational Hardware Trojans
2018 8th International Symposium on Embedded Computing and System Design (ISED), 2018Hardware Trojan (HT), caused by outsiders, modifies fabrication of a golden IC and avoids normal testing. The alteration by an HT targets disabling the main function of the IC or degrades signal integrity. Most vulnerable HTs are even designed to break hardware security.
Nilanjana Das +2 more
openaire +1 more source
Nonlinear analysis for hardware Trojan detection
2015 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), 2015As an important content of chip security, Hardware Trojan detection has attracted a lot of attention. The existing Hardware Trojan detection methods based on side-channel power consumption are effective. The main existing Hardware Trojan detection methods based on side-channel power consumption analysis mainly concentrate on linear features but ignore ...
Errui Zhou +3 more
openaire +1 more source

