Results 31 to 40 of about 9,623 (197)

RF Analog Hardware Trojan Detection Through Electromagnetic Side-Channel

open access: yesIEEE Open Journal of Circuits and Systems, 2022
With the advent of globalization, hardware trojans provide an ever-present threat to the security of devices. Much of the research to date has centered around documenting and providing detection methods for digital trojans.
John Kan   +5 more
doaj   +1 more source

A Survey on the Design, Detection, and Prevention of Pre-Silicon Hardware Trojans

open access: yesIEEE Access
The complexity of the semiconductor design lifecycle and globalized manufacturing process creates concern over the threat of deliberate malicious alterations, or hardware Trojans, being inserted into microelectronic designs.
Jonathan Cruz, Jason Hamlet
doaj   +1 more source

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

Hardware Trojan Detection Using Controlled Circuit Aging

open access: yesIEEE Access, 2020
This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC.
Virinchi Roy Surabhi   +6 more
doaj   +1 more source

Hardware Trojan Detection by Delay and Electromagnetic Measurements [PDF]

open access: yes, 2015
International audience—Hardware Trojans (HT) inserted in integrated circuits have received special attention of researchers. In this paper, we present firstly a novel HT detection technique based on path delays measurements.
Bhasin, S   +7 more
core   +2 more sources

Liquid jet capabilities for ultrafast chemistry at the SwissFEL Alvra instrument

open access: yesJournal of Synchrotron Radiation, EarlyView.
The technical aspects of the Alvra endstation are outlined and its scientific capabilities are demonstrated with commissioning results obtained during the early years of SwissFEL's operation.The Alvra experimental station at the Swiss X‐ray free‐electron laser, SwissFEL, investigates ultrafast dynamics in chemical and biological systems using X‐ray ...
Claudio Cirelli   +9 more
wiley   +1 more source

The Influence of Big Data‐Driven Educational Technologies on College Teaching Development

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
Exploring the impact of big data on college instructors: enhancing teaching, fostering professional growth, and addressing challenges in data adoption and privacy. ABSTRACT The rapid development of big data and mobile Internet technologies has significantly influenced the instructional growth of college instructors. This study investigated how big data
Ling Yu, Wenye Li, Ying Luo
wiley   +1 more source

Reusing Logic Masking to Facilitate Hardware Trojan Detection [PDF]

open access: yes, 2016
Hardware Trojan (HT) and Integrated Circuit (IC)/ Intellectual Property (IP) piracy are important threats which may happen in untrusted fabrication foundries.
Beroulle, Vincent   +2 more
core  

Thermal Scans for Detecting Hardware Trojans [PDF]

open access: yes, 2018
It is well known that companies have been outsourcing their IC production to countries where it is simply not possible to guarantee the integrity of final products. This relocation trend creates a need for methodologies and embedded design solutions to identify counterfeits but also to detect potential Hardware Trojans (HT).
Cozzi, Maxime   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy