Results 81 to 90 of about 9,623 (197)

Golden Chip-Free Hardware Trojan Detection Using Attention-Based Non-Local Convolution With Simple Recurrent Unit

open access: yesIEEE Access
The globalization of the semiconductor industry introduces vulnerabilities like hardware Trojans that compromise hardware security and pose serious risks to critical applications such as military and medical systems. Traditional hardware Trojan detection
Rama Devi Maddineni, Deepak Ch
doaj   +1 more source

A neural network framework based on ConvNeXt for side-channel hardware Trojan detection

open access: yesETRI Journal
Researchers in the field of hardware security have been dedicated to the study of hardware Trojan detection. Among the various approaches, side-channel detection methods are widely used because of their high detection accuracy and fewer constraints ...
Yuchan Gao   +4 more
doaj   +1 more source

A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits

open access: yesIEEE Access, 2019
Modern IC designs often involve outsourced IP cores. It is convinced that there are opportunities in which the IP cores contain malicious logic, namely hardware Trojan (HT), which raises serious concerns about the trustworthiness of ICs used in mission ...
Qiang Liu, Pengyong Zhao, Fuqiang Chen
doaj   +1 more source

DART: Distribution-Aware Hardware Trojan Detection

open access: yesIEEE Transactions on Information Forensics and Security
Machine Learning (ML) has proven effective in Integrated Circuits (IC) security, particularly in Hardware Trojan (HT) detection. However, a model’s generalization potential depends on its ability to address distribution shifts (DS) in unseen data. Mitigating DS enhances a model’s adaptability to novel variations and threats within the dynamic realm of ...
Luke Chen   +5 more
openaire   +2 more sources

Hardware Trojan Detection in Open-Source Hardware Designs Using Machine Learning

open access: yesIEEE Access
The globalization of the hardware supply chain reduces costs but increases security challenges with the potential insertion of hardware trojans by third parties.
Victor Takashi Hayashi   +1 more
doaj   +1 more source

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

open access: yesJournal of Sensor and Actuator Networks, 2019
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software ...
Simranjeet Sidhu   +2 more
doaj   +1 more source

Physical hardware trojan failure analysis and detection method

open access: yesActa Physica Sinica, 2016
The semiconductor industry is rapidly developing in the global market, and chip design companies usually purchase the third-party EDA tools in order to shorten the design cycle of IC and reduce manufacturing cost. Therefore, in the IC chip production procedure there exist a lot of insecurity factors, and the hardware security of IC chips becomes the ...
Yang Luo, Ya-Nan Wang
openaire   +1 more source

PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans

open access: yesIEEE Access
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties.
Junjun Huan   +3 more
doaj   +1 more source

Hardware Trojan Design and Detection in Pre-Charge Half Buffer Asynchronous Circuits

open access: yesIEEE Access
The escalating landscape of cyber warfare has made the detection of hardware Trojans, malicious circuit components capable of leaking sensitive information, a critical research priority.
Chukwunalu Asuai   +3 more
doaj   +1 more source

Robust hardware Trojan detection leveraging dual-domain features and stacked ensemble learning

open access: yesCybersecurity
Cyber-physical systems rely on sensors, communication, and computing, all powered by integrated circuits (ICs). These ICs are vulnerable to malicious hardware attacks, with hardware Trojans being one of the stealthiest threats.
Sefatun-Noor Puspa   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy