Results 21 to 30 of about 9,568 (196)
Due to the globalization of the design and fabrication process of integrated circuits (ICs), ICs are becoming vulnerable to hardware Trojans. Most of the existing hardware Trojan detection works assume that the testing stage is trustworthy.
Mingfu Xue +3 more
doaj +1 more source
Research on Influencing Factor of Hardware Trojan Side-channel Detection Method [PDF]
The side-channel detection method screens the hardware Trojan circuit by collecting physical parameters such as power consumption,delay,and electromagnetic field,but its detection performance is seriously affected by process fluctuation,and process ...
LI Ying,CHEN Lan,ZHOU Yinhao
doaj +1 more source
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things
With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things.
Chen Dong +3 more
doaj +1 more source
Hardware Trojan Detection by Delay and Electromagnetic Measurements [PDF]
International audience—Hardware Trojans (HT) inserted in integrated circuits have received special attention of researchers. In this paper, we present firstly a novel HT detection technique based on path delays measurements.
Bhasin, S +7 more
core +2 more sources
Gate-Level Hardware Trojan Detection Method for Graph Neural Networks Based on Controllability Metrics [PDF]
With the continuous increase in globalization, third-party Intellectual Property (IP) core applications have become increasingly widespread. The gradual maturity of hardware Trojan attack technology enables the implantation of hardware Trojan in the chip
Yang ZHANG, Chang LIU, Shaoqing LI
doaj +1 more source
Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems
Internet of Things (IoT) and Cyber-Physical Systems (CPS) have profoundly influenced the way individuals and enterprises interact with the world. Although attacks on IoT devices are becoming more commonplace, security metrics often focus on software ...
Anju P. Johnson +2 more
doaj +1 more source
Hybrid multi‐level hardware Trojan detection platform for gate‐level netlists based on XGBoost
Coping with the problem of malicious third‐party vendors implanting Hardware Trojan (HT) in the circuit design stage, this paper proposes a hybrid‐mode gate‐level hardware Trojan detection platform based on the XGBoost algorithm.
Ying Zhang +6 more
doaj +1 more source
Invisible Trojan-horse attack [PDF]
We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique.
Jain, Nitin +3 more
core +2 more sources
Practical challenges in quantum key distribution [PDF]
Quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key ...
Diamanti, Eleni +3 more
core +3 more sources
RF Analog Hardware Trojan Detection Through Electromagnetic Side-Channel
With the advent of globalization, hardware trojans provide an ever-present threat to the security of devices. Much of the research to date has centered around documenting and providing detection methods for digital trojans.
John Kan +5 more
doaj +1 more source

