Results 161 to 170 of about 9,568 (196)
Some of the next articles are maybe not open access.

Self-Reference-Based Hardware Trojan Detection

IEEE Transactions on Semiconductor Manufacturing, 2018
Outsourcing of the chip product chain makes hardware vulnerable to be attacked. For example, an attacker who has access to hardware fabrication process can alter the genuine hardware with the insertion of concealed hardware elements [hardware Trojan (HT)]. Therefore, microelectronic circuit HT detection becomes a key step of chip production.
Hao Xue, Saiyu Ren
openaire   +1 more source

Hardware Trojan detection methodology for FPGA

2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), 2013
Nowadays, hardware Trojan protection became a hot topic especially after the horizontal silicon industry business model. Third party IPs are the building blocks of many critical systems and that arises the question of confidentiality and reliability of these blocks.
Amr Al-Anwar   +3 more
openaire   +1 more source

Detecting Hardware Trojans Using Delay Analysis

2017
The migration of the semiconductor industry to a distributed and out-sourced business model, in which design, integration, manufacturing, packaging, test, and assembly are activities carried out by multiple companies all over the world, has created challenges related to intellectual property (IP) piracy, reverse-engineering attacks on netlists and chip
Jim Plusquellic, Fareena Saqib
openaire   +1 more source

Testability of Cryptographic Hardware and Detection of Hardware Trojans

2011 Asian Test Symposium, 2011
Cryptographic algorithms are routinely used toper form computationally intense operations over increasingly larger volumes of data, and in order to meet the high throughput requirements of the applications, are often implemented by VLSI designs. The high complexity of such implementations raises concern about their reliability. In order to improve upon
Debdeep Mukhopadhyay   +1 more
openaire   +1 more source

Hardware Trojan Detection

2023
Mark Tehranipoor   +2 more
openaire   +1 more source

CAD for Hardware Trojan Detection

2023
Farimah Farahmandi   +3 more
openaire   +1 more source

AI Hardware Oriented Trojan Detection Architecture

The 2022 5th International Conference on Electronics, Communications and Control Engineering, 2022
Shu Takemoto   +3 more
openaire   +1 more source

Signal processing for hardware trojan detection

2020
Today, with increasing technological advances, trustworthiness has also been a major problem. Taking the production of IC as a global parameter is one of the strategies for reducing the chip cost. Advantages in manufacturing cost and an access to advanced fabrication facilities enforce manufacturer to outsource IC fabrication so that costs are reduced.
openaire   +1 more source

CRC-Based Hardware Trojan Detection for Improved Hardware Security

2018
Several methodologies aim at tackling the issue of Hardware Trojans through the help of a “Golden Reference”, which is not always available; thereby arises the need for an efficient method without a Golden Reference. This work involves the detection of Hardware Trojan in a circuit using an improved voting algorithm employing CRC. Two modifications to a
N. Mohankumar   +2 more
openaire   +1 more source

Hardware Trojans: Threats, Detection, and Prevention

Proceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management, 2023
Chaoen Xiao   +6 more
openaire   +1 more source

Home - About - Disclaimer - Privacy