Results 1 to 10 of about 809,010 (236)

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

open access: yesJournal of Sensor and Actuator Networks, 2019
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software ...
Simranjeet Sidhu   +2 more
doaj   +4 more sources

Hardware Trojans in Chips: A Survey for Detection and Prevention. [PDF]

open access: yesSensors (Basel), 2020
Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs.
Dong C   +5 more
europepmc   +2 more sources

Detecting Unknown Hardware Trojans in Register Transfer Level Leveraging Verilog Conditional Branching Features

open access: yesIEEE Access, 2023
Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction ...
Sarwono Sutikno   +3 more
doaj   +2 more sources

Design and analysis of hardware Trojans in approximate circuits

open access: yesElectronics Letters, 2022
Approximate computing can accept errors in computation systems to achieve better utilisation of hardware resources. Approximate computing has been successfully developed in integrated circuits, such as approximate arithemtic circuits and approximate ...
Yuqin Dou   +4 more
doaj   +2 more sources

Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) [PDF]

open access: yesMicromachines, 2023
Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical.
Musharraf Hussain   +6 more
doaj   +2 more sources

A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study [PDF]

open access: yesPeerJ Computer Science, 2020
Integrated circuits may be vulnerable to hardware Trojan attacks during its design or fabrication phases. This article is a case study of the design of a Viterbi decoder and the effect of hardware Trojans on a coded communication system employing the ...
Varsha Kakkara   +5 more
doaj   +3 more sources

Locating Hardware Trojans Using Combinatorial Testing for Cryptographic Circuits

open access: yesIEEE Access, 2022
This paper presents a novel method for locating combinational hardware Trojans (HT) based on fault location approaches used in combinatorial testing.
Ludwig Kampel   +2 more
doaj   +2 more sources

An Unsupervised Detection Approach for Hardware Trojans

open access: yesIEEE Access, 2020
With the booming development of the cyber-physical system, human society is much more dependent on information technology. Unfortunately, like software, hardware is not trusted at all, due to so many third parties involved in the separated integrated ...
Chen Dong   +5 more
doaj   +2 more sources

A dual mode self-test for a stand alone AES core. [PDF]

open access: yesPLoS ONE, 2021
Advanced Encryption Standard (AES) is the most secured ciphertext algorithm that is unbreakable in a software platform's reasonable time. AES has been proved to be the most robust symmetric encryption algorithm declared by the USA Government.
Fakir Sharif Hossain   +3 more
doaj   +2 more sources

Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a Physically Unclonable Function-Based Countermeasure Detection Technique [PDF]

open access: yesMicromachines
Convolutional neural networks (CNNs) have demonstrated significant superiority in modern artificial intelligence (AI) applications. To accelerate the inference process of CNNs, reconfigurable CNN accelerators that support diverse networks are widely ...
Jia Hou   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy