Results 81 to 90 of about 9,623 (197)
The globalization of the semiconductor industry introduces vulnerabilities like hardware Trojans that compromise hardware security and pose serious risks to critical applications such as military and medical systems. Traditional hardware Trojan detection
Rama Devi Maddineni, Deepak Ch
doaj +1 more source
A neural network framework based on ConvNeXt for side-channel hardware Trojan detection
Researchers in the field of hardware security have been dedicated to the study of hardware Trojan detection. Among the various approaches, side-channel detection methods are widely used because of their high detection accuracy and fewer constraints ...
Yuchan Gao +4 more
doaj +1 more source
A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits
Modern IC designs often involve outsourced IP cores. It is convinced that there are opportunities in which the IP cores contain malicious logic, namely hardware Trojan (HT), which raises serious concerns about the trustworthiness of ICs used in mission ...
Qiang Liu, Pengyong Zhao, Fuqiang Chen
doaj +1 more source
DART: Distribution-Aware Hardware Trojan Detection
Machine Learning (ML) has proven effective in Integrated Circuits (IC) security, particularly in Hardware Trojan (HT) detection. However, a model’s generalization potential depends on its ability to address distribution shifts (DS) in unseen data. Mitigating DS enhances a model’s adaptability to novel variations and threats within the dynamic realm of ...
Luke Chen +5 more
openaire +2 more sources
Hardware Trojan Detection in Open-Source Hardware Designs Using Machine Learning
The globalization of the hardware supply chain reduces costs but increases security challenges with the potential insertion of hardware trojans by third parties.
Victor Takashi Hayashi +1 more
doaj +1 more source
Hardware Security in IoT Devices with Emphasis on Hardware Trojans
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software ...
Simranjeet Sidhu +2 more
doaj +1 more source
Physical hardware trojan failure analysis and detection method
The semiconductor industry is rapidly developing in the global market, and chip design companies usually purchase the third-party EDA tools in order to shorten the design cycle of IC and reduce manufacturing cost. Therefore, in the IC chip production procedure there exist a lot of insecurity factors, and the hardware security of IC chips becomes the ...
Yang Luo, Ya-Nan Wang
openaire +1 more source
PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties.
Junjun Huan +3 more
doaj +1 more source
Hardware Trojan Design and Detection in Pre-Charge Half Buffer Asynchronous Circuits
The escalating landscape of cyber warfare has made the detection of hardware Trojans, malicious circuit components capable of leaking sensitive information, a critical research priority.
Chukwunalu Asuai +3 more
doaj +1 more source
Robust hardware Trojan detection leveraging dual-domain features and stacked ensemble learning
Cyber-physical systems rely on sensors, communication, and computing, all powered by integrated circuits (ICs). These ICs are vulnerable to malicious hardware attacks, with hardware Trojans being one of the stealthiest threats.
Sefatun-Noor Puspa +5 more
doaj +1 more source

