Results 81 to 90 of about 9,568 (196)

A neural network framework based on ConvNeXt for side-channel hardware Trojan detection

open access: yesETRI Journal
Researchers in the field of hardware security have been dedicated to the study of hardware Trojan detection. Among the various approaches, side-channel detection methods are widely used because of their high detection accuracy and fewer constraints ...
Yuchan Gao   +4 more
doaj   +1 more source

A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits

open access: yesIEEE Access, 2019
Modern IC designs often involve outsourced IP cores. It is convinced that there are opportunities in which the IP cores contain malicious logic, namely hardware Trojan (HT), which raises serious concerns about the trustworthiness of ICs used in mission ...
Qiang Liu, Pengyong Zhao, Fuqiang Chen
doaj   +1 more source

DART: Distribution-Aware Hardware Trojan Detection

open access: yesIEEE Transactions on Information Forensics and Security
Machine Learning (ML) has proven effective in Integrated Circuits (IC) security, particularly in Hardware Trojan (HT) detection. However, a model’s generalization potential depends on its ability to address distribution shifts (DS) in unseen data. Mitigating DS enhances a model’s adaptability to novel variations and threats within the dynamic realm of ...
Luke Chen   +5 more
openaire   +2 more sources

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

open access: yesJournal of Sensor and Actuator Networks, 2019
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software ...
Simranjeet Sidhu   +2 more
doaj   +1 more source

Hardware Trojan Detection in Open-Source Hardware Designs Using Machine Learning

open access: yesIEEE Access
The globalization of the hardware supply chain reduces costs but increases security challenges with the potential insertion of hardware trojans by third parties.
Victor Takashi Hayashi   +1 more
doaj   +1 more source

Physical hardware trojan failure analysis and detection method

open access: yesActa Physica Sinica, 2016
The semiconductor industry is rapidly developing in the global market, and chip design companies usually purchase the third-party EDA tools in order to shorten the design cycle of IC and reduce manufacturing cost. Therefore, in the IC chip production procedure there exist a lot of insecurity factors, and the hardware security of IC chips becomes the ...
Yang Luo, Ya-Nan Wang
openaire   +1 more source

PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans

open access: yesIEEE Access
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties.
Junjun Huan   +3 more
doaj   +1 more source

Robust hardware Trojan detection leveraging dual-domain features and stacked ensemble learning

open access: yesCybersecurity
Cyber-physical systems rely on sensors, communication, and computing, all powered by integrated circuits (ICs). These ICs are vulnerable to malicious hardware attacks, with hardware Trojans being one of the stealthiest threats.
Sefatun-Noor Puspa   +5 more
doaj   +1 more source

Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs

open access: yesCryptography
Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime, making them ideal for applications such as data centers, cloud computing, and edge computing. This reconfiguration, often achieved through remote access, enables
Jaya Dofe   +3 more
doaj   +1 more source

87th Annual Meeting of the Meteoritical Society 2025: Abstracts

open access: yes
Meteoritics &Planetary Science, Volume 60, Issue S1, Page 30-350, August 2025.
wiley   +1 more source

Home - About - Disclaimer - Privacy