Results 101 to 110 of about 809,010 (236)
Hardware trojans in reconfigurable computing
Wettstreit zwischen der Entwicklung neuer Hardwaretrojaner und entsprechender Gegenma nahmen beschreiten Widersacher immer raffiniertere Wege um Schaltungsentw rfe zu infizieren und dabei selbst fortgeschrittene Test- und Verifikationsmethoden zu berlisten.
openaire +2 more sources
87th Annual Meeting of the Meteoritical Society 2025: Abstracts
Meteoritics &Planetary Science, Volume 60, Issue S1, Page 30-350, August 2025.
wiley +1 more source
A cycle-level recovery method for embedded processor against HT tamper. [PDF]
Zhou W, Ye KH, Yuan S, Li L.
europepmc +1 more source
Security Threats and AI-Based Detection Techniques in IoT Chips
The rapid expansion of the Internet of Things (IoT) has opened resource-limited devices to novel physical threats, such as Side-Channel Attacks (SCAs) and Hardware Trojans (HTs).
Hiba El Balbali, Anas Abou El Kalam
doaj +1 more source
Triggered Hardware Trojan Detection in IP Cores for Ensuring Safety in Cyber Physical Systems
Cyber physical systems (CPSs) increasingly depend on complex hardware IP cores to perform critical functions. However, triggered hardware Trojans’ stealthy, malicious modifications activated under rare conditions pose significant threats to the safety ...
Mahfuzur Rahman Talukder +3 more
doaj +1 more source
Intelligent Electromagnetic Sensors for Non-Invasive Trojan Detection. [PDF]
Chen E, Kan J, Yang BY, Zhu J, Chen V.
europepmc +1 more source
A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World. [PDF]
Cultice T, Clark J, Yang W, Thapliyal H.
europepmc +1 more source
Cryptographically Secure PseudoRandom Bit Generator for Wearable Technology. [PDF]
Melosik M +4 more
europepmc +1 more source
A Circuit-Level Solution for Secure Temperature Sensor. [PDF]
Kajol MA, Monjur MMR, Yu Q.
europepmc +1 more source
Hardware Trojans (HTs) are hidden threats embedded in the circuitry of integrated circuits (ICs), enabling unauthorized access, data theft, operational disruptions, or even physical harm.
Abdurrahman Nasr +3 more
doaj +1 more source

