Results 1 to 10 of about 8,334 (151)

Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) [PDF]

open access: yesMicromachines, 2023
Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical.
Musharraf Hussain   +6 more
doaj   +2 more sources

A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study [PDF]

open access: yesPeerJ Computer Science, 2020
Integrated circuits may be vulnerable to hardware Trojan attacks during its design or fabrication phases. This article is a case study of the design of a Viterbi decoder and the effect of hardware Trojans on a coded communication system employing the ...
Varsha Kakkara   +5 more
doaj   +3 more sources

A dual mode self-test for a stand alone AES core. [PDF]

open access: yesPLoS ONE, 2021
Advanced Encryption Standard (AES) is the most secured ciphertext algorithm that is unbreakable in a software platform's reasonable time. AES has been proved to be the most robust symmetric encryption algorithm declared by the USA Government.
Fakir Sharif Hossain   +3 more
doaj   +2 more sources

Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a Physically Unclonable Function-Based Countermeasure Detection Technique [PDF]

open access: yesMicromachines
Convolutional neural networks (CNNs) have demonstrated significant superiority in modern artificial intelligence (AI) applications. To accelerate the inference process of CNNs, reconfigurable CNN accelerators that support diverse networks are widely ...
Jia Hou   +3 more
doaj   +2 more sources

ChipletQuake: On-Die Digital Impedance Sensing for Chiplet and Interposer Verification [PDF]

open access: yesSensors
The increasing complexity and cost of manufacturing monolithic chips have driven the semiconductor industry toward chiplet-based designs, where smaller, modular chiplets are integrated onto a single interposer.
Saleh Khalaj Monfared   +2 more
doaj   +2 more sources

A New Characterization of Hardware Trojans

open access: yesIEEE Access, 2016
This paper examines hardware trojan threats to semiconductor chips, which is particularly important for chips intended for vital infrastructure and critical applications.
Samer Moein   +3 more
doaj   +3 more sources

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

open access: yesJournal of Sensor and Actuator Networks, 2019
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software ...
Simranjeet Sidhu   +2 more
doaj   +3 more sources

Hardware Trojan Detection Based on Long Short-Term Memory Neural Network [PDF]

open access: yesJisuanji gongcheng, 2020
Hardware Trojans pose a huge threat to the reliability of integrated circuit chips.Therefore,this paper proposes a hardware Trojan detection method based on Principal Component Analysis(PCA) and Long Short-Term Memory(LSTM) neural network.The method uses
HU Tao, DIAN Songyi, JIANG Ronghua
doaj   +1 more source

Design and analysis of hardware Trojans in approximate circuits

open access: yesElectronics Letters, 2022
Approximate computing can accept errors in computation systems to achieve better utilisation of hardware resources. Approximate computing has been successfully developed in integrated circuits, such as approximate arithemtic circuits and approximate ...
Yuqin Dou   +4 more
doaj   +1 more source

Implantation and Detection of a Sequential Bus Hardware Trojan [PDF]

open access: yesJisuanji gongcheng, 2021
RS bus integrated circuit has been widely used in aerospace and industrial control.With the hardware Trojan detection for integrated circuits becoming a research hotspot,as a branch of bus hardware Trojan research field,its design has been paid more and ...
HUANG Jiaoying, LI Shengyu, GAO Cheng, YANG Daming
doaj   +1 more source

Home - About - Disclaimer - Privacy