Results 11 to 20 of about 9,568 (196)
Hardware Trojan Detection Based on Improved Euclidean Distance [PDF]
The accuracy of the hardware Trojan detection method based on the traditional Euclidean distance discrimination is too low to meet the demand.For this reason,the side-channel power consumption information is collected and analized in this paper,and an ...
WANG Jianxin,WANG Boren,QU Ming,ZHANG Lei
doaj +1 more source
Hardware Trojan Detection Based on Long Short-Term Memory Neural Network [PDF]
Hardware Trojans pose a huge threat to the reliability of integrated circuit chips.Therefore,this paper proposes a hardware Trojan detection method based on Principal Component Analysis(PCA) and Long Short-Term Memory(LSTM) neural network.The method uses
HU Tao, DIAN Songyi, JIANG Ronghua
doaj +1 more source
Research on hardware Trojan defense
The definition and features of hardware Trojan were described firstly.After that,recent researches of defense and detection techniques were categorized with complete comparison and analysis.Then,current researches limitations were discussed based on the ...
Kan WANG +3 more
doaj +3 more sources
Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction ...
Sarwono Sutikno +3 more
doaj +1 more source
Creation and detection of hardware trojans using non-invasive off-the-shelf technologies [PDF]
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans.
Bellekens, Xavier +2 more
core +5 more sources
Hardware Trojan Identification and Detection
ABSTRACT The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques.
Moein, Samer +3 more
openaire +1 more source
Design and detection of hardware Trojan based on satisfiability don't cares
Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.A new security threat of lightweight stealthy hardware Trojans leveraging discrete ...
Lingjuan WU +4 more
doaj +3 more sources
The ageing phenomenon of negative bias temperature instability (NBTI) continues to challenge the dynamic thermal management of modern FPGAs. Increased transistor density leads to thermal accumulation and propagates higher and non-uniform temperature ...
Sohaib Aslam +4 more
doaj +1 more source
Hardware trojan detection based on the optimized SVM algorithm
The main research direction of hardware trojan detection is based on the side channel analysis. This paper proposes an optimized support vector machine(SVM) classification method to improve the accuracy and speed when analyzing the data for detection ...
Zhang Lei +3 more
doaj +1 more source
Hardware Trojan Detection Method Based on Hidden Markov Model [PDF]
Hardware Trojan causes a huge threat to the reliability of the integrated circuit chips,so this paper proposes a Trojan detection method based on Hidden Markov Model(HMM).It extracts the characteristic parameters of original circuit data,trains the ...
GAO Zhenbin,BAI Xue,YANG Song,HE Jiaji
doaj +1 more source

