Results 161 to 170 of about 9,568 (196)
Some of the next articles are maybe not open access.
Self-Reference-Based Hardware Trojan Detection
IEEE Transactions on Semiconductor Manufacturing, 2018Outsourcing of the chip product chain makes hardware vulnerable to be attacked. For example, an attacker who has access to hardware fabrication process can alter the genuine hardware with the insertion of concealed hardware elements [hardware Trojan (HT)]. Therefore, microelectronic circuit HT detection becomes a key step of chip production.
Hao Xue, Saiyu Ren
openaire +1 more source
Hardware Trojan detection methodology for FPGA
2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), 2013Nowadays, hardware Trojan protection became a hot topic especially after the horizontal silicon industry business model. Third party IPs are the building blocks of many critical systems and that arises the question of confidentiality and reliability of these blocks.
Amr Al-Anwar +3 more
openaire +1 more source
Detecting Hardware Trojans Using Delay Analysis
2017The migration of the semiconductor industry to a distributed and out-sourced business model, in which design, integration, manufacturing, packaging, test, and assembly are activities carried out by multiple companies all over the world, has created challenges related to intellectual property (IP) piracy, reverse-engineering attacks on netlists and chip
Jim Plusquellic, Fareena Saqib
openaire +1 more source
Testability of Cryptographic Hardware and Detection of Hardware Trojans
2011 Asian Test Symposium, 2011Cryptographic algorithms are routinely used toper form computationally intense operations over increasingly larger volumes of data, and in order to meet the high throughput requirements of the applications, are often implemented by VLSI designs. The high complexity of such implementations raises concern about their reliability. In order to improve upon
Debdeep Mukhopadhyay +1 more
openaire +1 more source
AI Hardware Oriented Trojan Detection Architecture
The 2022 5th International Conference on Electronics, Communications and Control Engineering, 2022Shu Takemoto +3 more
openaire +1 more source
Signal processing for hardware trojan detection
2020Today, with increasing technological advances, trustworthiness has also been a major problem. Taking the production of IC as a global parameter is one of the strategies for reducing the chip cost. Advantages in manufacturing cost and an access to advanced fabrication facilities enforce manufacturer to outsource IC fabrication so that costs are reduced.
openaire +1 more source
CRC-Based Hardware Trojan Detection for Improved Hardware Security
2018Several methodologies aim at tackling the issue of Hardware Trojans through the help of a “Golden Reference”, which is not always available; thereby arises the need for an efficient method without a Golden Reference. This work involves the detection of Hardware Trojan in a circuit using an improved voting algorithm employing CRC. Two modifications to a
N. Mohankumar +2 more
openaire +1 more source
Hardware Trojans: Threats, Detection, and Prevention
Proceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management, 2023Chaoen Xiao +6 more
openaire +1 more source

