Results 101 to 110 of about 809,010 (236)

Hardware trojans in reconfigurable computing

open access: yes, 2022
Wettstreit zwischen der Entwicklung neuer Hardwaretrojaner und entsprechender Gegenma nahmen beschreiten Widersacher immer raffiniertere Wege um Schaltungsentw rfe zu infizieren und dabei selbst fortgeschrittene Test- und Verifikationsmethoden zu berlisten.
openaire   +2 more sources

87th Annual Meeting of the Meteoritical Society 2025: Abstracts

open access: yes
Meteoritics &Planetary Science, Volume 60, Issue S1, Page 30-350, August 2025.
wiley   +1 more source

Security Threats and AI-Based Detection Techniques in IoT Chips

open access: yesChips
The rapid expansion of the Internet of Things (IoT) has opened resource-limited devices to novel physical threats, such as Side-Channel Attacks (SCAs) and Hardware Trojans (HTs).
Hiba El Balbali, Anas Abou El Kalam
doaj   +1 more source

Triggered Hardware Trojan Detection in IP Cores for Ensuring Safety in Cyber Physical Systems

open access: yesChips
Cyber physical systems (CPSs) increasingly depend on complex hardware IP cores to perform critical functions. However, triggered hardware Trojans’ stealthy, malicious modifications activated under rare conditions pose significant threats to the safety ...
Mahfuzur Rahman Talukder   +3 more
doaj   +1 more source

Cryptographically Secure PseudoRandom Bit Generator for Wearable Technology. [PDF]

open access: yesEntropy (Basel), 2023
Melosik M   +4 more
europepmc   +1 more source

A Siamese deep learning framework for efficient hardware Trojan detection using power side-channel data

open access: yesScientific Reports
Hardware Trojans (HTs) are hidden threats embedded in the circuitry of integrated circuits (ICs), enabling unauthorized access, data theft, operational disruptions, or even physical harm.
Abdurrahman Nasr   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy