Results 11 to 20 of about 9,568 (196)

Hardware Trojan Detection Based on Improved Euclidean Distance [PDF]

open access: yesJisuanji gongcheng, 2017
The accuracy of the hardware Trojan detection method based on the traditional Euclidean distance discrimination is too low to meet the demand.For this reason,the side-channel power consumption information is collected and analized in this paper,and an ...
WANG Jianxin,WANG Boren,QU Ming,ZHANG Lei
doaj   +1 more source

Hardware Trojan Detection Based on Long Short-Term Memory Neural Network [PDF]

open access: yesJisuanji gongcheng, 2020
Hardware Trojans pose a huge threat to the reliability of integrated circuit chips.Therefore,this paper proposes a hardware Trojan detection method based on Principal Component Analysis(PCA) and Long Short-Term Memory(LSTM) neural network.The method uses
HU Tao, DIAN Songyi, JIANG Ronghua
doaj   +1 more source

Research on hardware Trojan defense

open access: yes网络与信息安全学报, 2017
The definition and features of hardware Trojan were described firstly.After that,recent researches of defense and detection techniques were categorized with complete comparison and analysis.Then,current researches limitations were discussed based on the ...
Kan WANG   +3 more
doaj   +3 more sources

Detecting Unknown Hardware Trojans in Register Transfer Level Leveraging Verilog Conditional Branching Features

open access: yesIEEE Access, 2023
Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction ...
Sarwono Sutikno   +3 more
doaj   +1 more source

Creation and detection of hardware trojans using non-invasive off-the-shelf technologies [PDF]

open access: yes, 2018
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans.
Bellekens, Xavier   +2 more
core   +5 more sources

Hardware Trojan Identification and Detection

open access: yesInternational Journal on Cryptography and Information Security, 2017
ABSTRACT The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques.
Moein, Samer   +3 more
openaire   +1 more source

Design and detection of hardware Trojan based on satisfiability don't cares

open access: yes网络与信息安全学报, 2021
Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.A new security threat of lightweight stealthy hardware Trojans leveraging discrete ...
Lingjuan WU   +4 more
doaj   +3 more sources

Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric–Detection Methodology and Mitigation

open access: yesIEEE Access, 2020
The ageing phenomenon of negative bias temperature instability (NBTI) continues to challenge the dynamic thermal management of modern FPGAs. Increased transistor density leads to thermal accumulation and propagates higher and non-uniform temperature ...
Sohaib Aslam   +4 more
doaj   +1 more source

Hardware trojan detection based on the optimized SVM algorithm

open access: yesDianzi Jishu Yingyong, 2018
The main research direction of hardware trojan detection is based on the side channel analysis. This paper proposes an optimized support vector machine(SVM) classification method to improve the accuracy and speed when analyzing the data for detection ...
Zhang Lei   +3 more
doaj   +1 more source

Hardware Trojan Detection Method Based on Hidden Markov Model [PDF]

open access: yesJisuanji gongcheng, 2016
Hardware Trojan causes a huge threat to the reliability of the integrated circuit chips,so this paper proposes a Trojan detection method based on Hidden Markov Model(HMM).It extracts the characteristic parameters of original circuit data,trains the ...
GAO Zhenbin,BAI Xue,YANG Song,HE Jiaji
doaj   +1 more source

Home - About - Disclaimer - Privacy