Results 61 to 70 of about 9,568 (196)
AVATAR: NN-Assisted Variation Aware Timing Analysis and Reporting for Hardware Trojan Detection
This paper presents AVATAR, a learning-assisted Trojan testing flow to detect hardware Trojans placed into fabricated ICs at an untrusted foundry, without needing a Golden IC.
Ashkan Vakil +4 more
doaj +1 more source
Using outliers to detect stealthy hardware trojan triggering? [PDF]
Hardware Trojans (HTs) are malicious alterations to a circuit introduced at design or manufacturing phases by an adversary. Due to their diversity, detecting and/or locating them are challenging tasks. Among the different kinds of detection methods, methods based on logic testing aim to reveal the presence of HTs thanks to their logical activation and ...
Ba, Papa-Sidy +4 more
openaire +2 more sources
Rapid digital adoption in Nigeria has been accompanied by rising cybercrime; a 2021 Sophos survey found 71% of Nigerian organizations experienced cyberattacks, 44% of which paid ransoms averaging USD 3.43 million. The integration of emerging technologies (artificial intelligence, blockchain, Internet of Things, and 5G) offers transformative ...
Goddy Uwa Osimen +5 more
wiley +1 more source
A proactive, predictive, and integrative framework that integrates multi‐omics innovations with ecological modeling and big data analytics to guide adaptive interventions and governance in invasive species management. By integrating multi‐omics insights with advanced ecological modeling, remote sensing, artificial intelligence, and cross‐disciplinary ...
Aibin Zhan
wiley +1 more source
Triggered Hardware Trojan Detection in IP Cores for Ensuring Safety in Cyber Physical Systems
Cyber physical systems (CPSs) increasingly depend on complex hardware IP cores to perform critical functions. However, triggered hardware Trojans’ stealthy, malicious modifications activated under rare conditions pose significant threats to the safety ...
Mahfuzur Rahman Talukder +3 more
doaj +1 more source
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee +4 more
wiley +1 more source
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones [PDF]
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites.
Crandall, David +3 more
core
Creation of backdoors in quantum communications via laser damage
Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true.
Bourgoin, Jean-Philippe +9 more
core +1 more source
Hardware Trojans detection based on projection pursuit
A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension ...
Peng ZHANG, Xin-cheng WANG, Qing ZHOU
doaj +2 more sources
Deep Space Network Radio Science and Ground‐Based Planetary Radar in the Next Decade
Abstract The Deep Space Network (DSN) has been a core operational element of NASA's crewed and robotic exploration of the Solar System since the early 1960s. The primary role of the DSN has been to acquire telemetry and navigation data, but over the years, its radiometric and radar capabilities have expanded to form a system for obtaining unique ...
R. S. Park +13 more
wiley +1 more source

