Results 21 to 30 of about 9,623 (197)

Hardware Trojan Detection Method Based on Hidden Markov Model [PDF]

open access: yesJisuanji gongcheng, 2016
Hardware Trojan causes a huge threat to the reliability of the integrated circuit chips,so this paper proposes a Trojan detection method based on Hidden Markov Model(HMM).It extracts the characteristic parameters of original circuit data,trains the ...
GAO Zhenbin,BAI Xue,YANG Song,HE Jiaji
doaj   +1 more source

Invisible Trojan-horse attack [PDF]

open access: yes, 2017
We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique.
Jain, Nitin   +3 more
core   +2 more sources

Research on Influencing Factor of Hardware Trojan Side-channel Detection Method [PDF]

open access: yesJisuanji gongcheng, 2019
The side-channel detection method screens the hardware Trojan circuit by collecting physical parameters such as power consumption,delay,and electromagnetic field,but its detection performance is seriously affected by process fluctuation,and process ...
LI Ying,CHEN Lan,ZHOU Yinhao
doaj   +1 more source

Trojan-horse attacks threaten the security of practical quantum cryptography [PDF]

open access: yes, 2014
A quantum key distribution system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack.
Anisimova, Elena   +5 more
core   +3 more sources

A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things

open access: yesInternational Journal of Distributed Sensor Networks, 2019
With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things.
Chen Dong   +3 more
doaj   +1 more source

Practical challenges in quantum key distribution [PDF]

open access: yes, 2016
Quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key ...
Diamanti, Eleni   +3 more
core   +3 more sources

Gate-Level Hardware Trojan Detection Method for Graph Neural Networks Based on Controllability Metrics [PDF]

open access: yesJisuanji gongcheng
With the continuous increase in globalization, third-party Intellectual Property (IP) core applications have become increasingly widespread. The gradual maturity of hardware Trojan attack technology enables the implantation of hardware Trojan in the chip
Yang ZHANG, Chang LIU, Shaoqing LI
doaj   +1 more source

Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems

open access: yesSensors, 2020
Internet of Things (IoT) and Cyber-Physical Systems (CPS) have profoundly influenced the way individuals and enterprises interact with the world. Although attacks on IoT devices are becoming more commonplace, security metrics often focus on software ...
Anju P. Johnson   +2 more
doaj   +1 more source

Hybrid multi‐level hardware Trojan detection platform for gate‐level netlists based on XGBoost

open access: yesIET Computers & Digital Techniques, 2022
Coping with the problem of malicious third‐party vendors implanting Hardware Trojan (HT) in the circuit design stage, this paper proposes a hybrid‐mode gate‐level hardware Trojan detection platform based on the XGBoost algorithm.
Ying Zhang   +6 more
doaj   +1 more source

Witnessing effective entanglement over a 2km fiber channel [PDF]

open access: yes, 2010
We present a fiber-based continuous-variable quantum key distribution system. In the scheme, a quantum signal of two non-orthogonal weak optical coherent states is sent through a fiber-based quantum channel. The receiver simultaneously measures conjugate
Bennett   +42 more
core   +1 more source

Home - About - Disclaimer - Privacy