Results 111 to 120 of about 809,010 (236)

Towards bidirectional LUT-level detection of hardware Trojans

open access: yesComputers & security, 2021
Mingi Cho   +5 more
semanticscholar   +1 more source

Dataset for hardware Trojan detection

open access: yes, 2022
Nowadays, cloud services rely extensively on the use of virtual machines to enforce security by isolation. However, hardware trojan attacks break this assumption. Within these attacks, cache side-channel attacks such as Spectre and Meltdown are the focus of this work.
openaire   +1 more source

On the dynamic reconfigurable implementations of MISTY1 and KASUMI block ciphers. [PDF]

open access: yesPLoS One, 2023
Jiexian H   +4 more
europepmc   +1 more source

Hardware Trojans. Part 4: software and hardware countermeasures [PDF]

open access: yesNanoindustry Russia, 2017
E. Kuznetsov, A. Saurov
openaire   +1 more source

Home - About - Disclaimer - Privacy