Results 41 to 50 of about 9,568 (196)
A security method of hardware Trojan detection using path tracking algorithm
Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to the globalization of IC design and manufacturing.
Der-Chen Huang +3 more
doaj +1 more source
Consistent Interpretation of Ensemble Classifiers in Trojan-Horse Detection
Hardware trojan classification/detection systems (HTDs) based on machine or deep learning have recently been proven to be effective. However, the existence of irrelevant features as well as class imbalance reduces the effectiveness of these models.
Rama Devi Maddineni, Deepak Ch
doaj +1 more source
Trojans in Early Design Steps—An Emerging Threat [PDF]
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T. +2 more
core
A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed +4 more
wiley +1 more source
A machine learning method for hardware Trojan detection on real chips
Due to the global supply chain of integrated circuits (IC) from design to application, Hardware Trojan (HT) may be stealthily inserted into ICs. The effect of HT detection methods are related to the signal-to-noise ratio (SNR) and the Trojan-to-circuit ...
C. Sun +5 more
doaj +1 more source
CERT strategy to deal with phishing attacks
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core +1 more source
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley +1 more source
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs.
Due to Hardware Trojan (HT), trustworthiness of Integrated Circuit (IC) supply chain is a burning issue in Semiconductor Industry nowadays. Over the last decade, extensive research has been carried on HT detection methods for digital circuits.
Liakot Ali, Farshad
doaj +1 more source
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea +5 more
core +1 more source
While neural networks demonstrate stronger capabilities in pattern recognition nowadays, they are also becoming larger and deeper. As a result, the effort needed to train a network also increases dramatically. In many cases, it is more practical to use a
Liu, Yuntao +2 more
core +1 more source

