Results 51 to 60 of about 9,623 (197)

Hardware Trojan detection method based upon XGBoost model

open access: yesDianzi Jishu Yingyong, 2019
This paper proposed a hardware Trojan detection method based upon XGBoost(eXtreme Gradient Boosting) model by using the analysis results of ring oscillator network, and used the cross-validation method to optimize the model.
Gao Hongbo   +3 more
doaj   +1 more source

Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs.

open access: yesPLoS ONE, 2021
Due to Hardware Trojan (HT), trustworthiness of Integrated Circuit (IC) supply chain is a burning issue in Semiconductor Industry nowadays. Over the last decade, extensive research has been carried on HT detection methods for digital circuits.
Liakot Ali, Farshad
doaj   +1 more source

Hardware Trojan Detection Using Graph Neural Networks

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities around the world. The risk of using untrusted third-Party Intellectual Property (3PIP) is the possibility for adversaries to insert malicious modifications ...
Rozhin Yasaei   +3 more
openaire   +2 more sources

SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber‐Physical Systems Based on Elliptic Curve Cryptography

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley   +1 more source

IP Soft Core Hardware Trojan Detection Method Based on Grayscale Graph Analysis [PDF]

open access: yesJisuanji gongcheng
With the refinement of the division of labor in chip design, manufacturing, and packaging processes, the use of third-party Intellectual Property(IP) soft cores for secondary development can significantly improve design efficiency and reduce duplication ...
Lin NI, Zihui LIU, Shuai ZHANG, Jiujiang HAN, Ming XIAN
doaj   +1 more source

A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Due to technical barriers and economic costs, malicious circuits, known as hardware Trojans, are easily implanted in the complicated integrated circuit design and manufacturing process, which can lead to many disastrous consequences, such as denial of ...
Dong Cheng   +5 more
doaj   +1 more source

Extraction of intrinsic structure for Hardware Trojan detection [PDF]

open access: yes, 2015
Cryptology ePrint Archive: Report 2015/912In this paper we present a novel solution to address the problem of potential malicious circuitry on FPGA. This method is based on an a technique of structure extraction which consider the infection of an all lot.
Fournier, Jacques Jean-Alain   +2 more
core   +1 more source

CERT strategy to deal with phishing attacks

open access: yes, 2017
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core   +1 more source

Delay‐Scheduled Adaptive Observer Control Strategy for Nonlinear Systems With Time‐Varying Delays

open access: yesIET Control Theory &Applications, Volume 20, Issue 1, January/December 2026.
This paper proposes a delay‐scheduled adaptive observer controller for nonlinear systems with unknown time‐varying delays and bounded disturbances. By integrating an adaptive observer with an LMI‐based state‐feedback controller, the method ensures robust stability and H∞$H_\infty$ performance. Numerical simulations on delayed Lorenz and hyperchaotic Lü
Mohammad Ali Labbaf Khaniki   +1 more
wiley   +1 more source

Side-channel based intrusion detection for industrial control systems

open access: yes, 2017
Industrial Control Systems are under increased scrutiny. Their security is historically sub-par, and although measures are being taken by the manufacturers to remedy this, the large installed base of legacy systems cannot easily be updated with state-of ...
A Beckers   +13 more
core   +1 more source

Home - About - Disclaimer - Privacy