Results 181 to 190 of about 9,623 (197)
Some of the next articles are maybe not open access.

Hardware Trojan Detection Using Reconfigurable Assertion Checkers

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019
Uthman Alsaiari, Fayez Gebali
exaly  

Reverse Engineering-Based Hardware Trojan Detection

2017
Chongxi Bao   +3 more
openaire   +1 more source

Activity Factor Based Hardware Trojan Detection and Localization

Journal of Electronic Testing: Theory and Applications (JETTA), 2019
Yongkang Tang, Liang Fang
exaly  

Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection

IEEE Transactions on Information Forensics and Security, 2012
Hassan Salmani
exaly  

A study on the efficiency of hardware Trojan detection based on path-delay fingerprinting

Microprocessors and Microsystems, 2014
Arash Nejat, Morteza Saheb Zamani
exaly  

Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs

IET Computers and Digital Techniques, 2019
Mingfu Xue, Jian Wang, Weiqiang Liu
exaly  

Introduction to Hardware Trojan Detection Methods

Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015, 2015
Julien Francq, Florian Frick
openaire   +1 more source

HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion

IEEE Transactions on Dependable and Secure Computing, 2019
Marc Fyrbiak   +2 more
exaly  

On Reverse Engineering-Based Hardware Trojan Detection

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2016
Chongxi Bao, Domenic Forte
exaly  

Home - About - Disclaimer - Privacy