Results 91 to 100 of about 8,384 (195)

SALWARE: Salutary Hardware to design Trusted IC.

open access: yes, 2013
Fabless semiconductor industries are facing the rise of design costs of integrated circuits. This rise is link to the technology change and the complexity increasing.
Bossuet, Lilian, Hely, David
core   +1 more source

Hardware Trojan Design and Detection in Pre-Charge Half Buffer Asynchronous Circuits

open access: yesIEEE Access
The escalating landscape of cyber warfare has made the detection of hardware Trojans, malicious circuit components capable of leaking sensitive information, a critical research priority.
Chukwunalu Asuai   +3 more
doaj   +1 more source

Security Threats and AI-Based Detection Techniques in IoT Chips

open access: yesChips
The rapid expansion of the Internet of Things (IoT) has opened resource-limited devices to novel physical threats, such as Side-Channel Attacks (SCAs) and Hardware Trojans (HTs).
Hiba El Balbali, Anas Abou El Kalam
doaj   +1 more source

Triggered Hardware Trojan Detection in IP Cores for Ensuring Safety in Cyber Physical Systems

open access: yesChips
Cyber physical systems (CPSs) increasingly depend on complex hardware IP cores to perform critical functions. However, triggered hardware Trojans’ stealthy, malicious modifications activated under rare conditions pose significant threats to the safety ...
Mahfuzur Rahman Talukder   +3 more
doaj   +1 more source

87th Annual Meeting of the Meteoritical Society 2025: Abstracts

open access: yes
Meteoritics &Planetary Science, Volume 60, Issue S1, Page 30-350, August 2025.
wiley   +1 more source

Cryptographically Secure PseudoRandom Bit Generator for Wearable Technology. [PDF]

open access: yesEntropy (Basel), 2023
Melosik M   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy