Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) [PDF]
Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical.
Musharraf Hussain +6 more
doaj +2 more sources
A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study [PDF]
Integrated circuits may be vulnerable to hardware Trojan attacks during its design or fabrication phases. This article is a case study of the design of a Viterbi decoder and the effect of hardware Trojans on a coded communication system employing the ...
Varsha Kakkara +5 more
doaj +3 more sources
A dual mode self-test for a stand alone AES core. [PDF]
Advanced Encryption Standard (AES) is the most secured ciphertext algorithm that is unbreakable in a software platform's reasonable time. AES has been proved to be the most robust symmetric encryption algorithm declared by the USA Government.
Fakir Sharif Hossain +3 more
doaj +2 more sources
Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a Physically Unclonable Function-Based Countermeasure Detection Technique [PDF]
Convolutional neural networks (CNNs) have demonstrated significant superiority in modern artificial intelligence (AI) applications. To accelerate the inference process of CNNs, reconfigurable CNN accelerators that support diverse networks are widely ...
Jia Hou +3 more
doaj +2 more sources
ChipletQuake: On-Die Digital Impedance Sensing for Chiplet and Interposer Verification [PDF]
The increasing complexity and cost of manufacturing monolithic chips have driven the semiconductor industry toward chiplet-based designs, where smaller, modular chiplets are integrated onto a single interposer.
Saleh Khalaj Monfared +2 more
doaj +2 more sources
A New Characterization of Hardware Trojans
This paper examines hardware trojan threats to semiconductor chips, which is particularly important for chips intended for vital infrastructure and critical applications.
Samer Moein +3 more
doaj +3 more sources
Hardware Security in IoT Devices with Emphasis on Hardware Trojans
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software ...
Simranjeet Sidhu +2 more
doaj +3 more sources
Hardware Trojan Detection Based on Long Short-Term Memory Neural Network [PDF]
Hardware Trojans pose a huge threat to the reliability of integrated circuit chips.Therefore,this paper proposes a hardware Trojan detection method based on Principal Component Analysis(PCA) and Long Short-Term Memory(LSTM) neural network.The method uses
HU Tao, DIAN Songyi, JIANG Ronghua
doaj +1 more source
Design and analysis of hardware Trojans in approximate circuits
Approximate computing can accept errors in computation systems to achieve better utilisation of hardware resources. Approximate computing has been successfully developed in integrated circuits, such as approximate arithemtic circuits and approximate ...
Yuqin Dou +4 more
doaj +1 more source
Implantation and Detection of a Sequential Bus Hardware Trojan [PDF]
RS bus integrated circuit has been widely used in aerospace and industrial control.With the hardware Trojan detection for integrated circuits becoming a research hotspot,as a branch of bus hardware Trojan research field,its design has been paid more and ...
HUANG Jiaoying, LI Shengyu, GAO Cheng, YANG Daming
doaj +1 more source

