Results 141 to 150 of about 8,384 (195)
Some of the next articles are maybe not open access.

Related searches:

Trustworthy Hardware: Identifying and Classifying Hardware Trojans

Computer, 2010
For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
Ramesh Karri   +2 more
exaly   +2 more sources

SRAM hardware Trojan

2016 8th International Symposium on Telecommunications (IST), 2016
Exploring possible vulnerabilities for making hardware Trojans helps designers to improve the security and trust of integrated circuits (ICs). This paper discusses the hardware Trojan possibility in SRAM to evaluate the security of SRAM and evaluates the effectiveness of existing detection methods.
Roghayeh Saeidi   +1 more
openaire   +1 more source

Implementing hardware Trojans: Experiences from a hardware Trojan challenge

2011 IEEE 29th International Conference on Computer Design (ICCD), 2011
Hardware Trojans have become a growing concern in the design of secure integrated circuits. In this work, we present a set of novel hardware Trojans aimed at evading detection methods, designed as part of the CSAW Embedded System Challenge 2010. We introduced and implemented unique Trojans based on side-channel analysis that leak the secret key in the ...
Georg T. Becker   +5 more
openaire   +1 more source

Testability of Cryptographic Hardware and Detection of Hardware Trojans

2011 Asian Test Symposium, 2011
Cryptographic algorithms are routinely used toper form computationally intense operations over increasingly larger volumes of data, and in order to meet the high throughput requirements of the applications, are often implemented by VLSI designs. The high complexity of such implementations raises concern about their reliability. In order to improve upon
Debdeep Mukhopadhyay   +1 more
openaire   +1 more source

Rise of the hardware Trojans

2011 IEEE 17th International On-Line Testing Symposium, 2011
Driven by strong economic incentives the globalization of the semiconductor design and fabrication industries has given rise to numerous vulnerabilities in the manufacturing chain. From design to production countless hands contribute until fabrication is completed.
openaire   +1 more source

On Parametric Hardware Trojans

2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST), 2021
With the eminence of third party foundry practice, insertion of hardware trojans in ICs is becoming a major threat. Insertion techniques of these hardware trojans are getting easier with sophisticated yet expensive equipment. The same very equipment which was basically used for IC surgeries is used for inserting hardware trojans.
exaly   +2 more sources

Strategic Hardware Trojan Testing with Hierarchical Trojan Types

2021 55th Annual Conference on Information Sciences and Systems (CISS), 2021
In this paper, we consider the problem of detecting hardware Trojans in an Integrated Circuit (IC) from a game theoretic standpoint. The paper considers the presence of multiple classes of Trojans, with each class containing multiple Trojan types, and characterizes the Nash Equilibrium (NE) strategy for inserting a Trojan (from the perspective of a ...
Swastik Brahma   +2 more
openaire   +1 more source

Hardware Trojan for security LSI

2013 IEEE International Conference on Consumer Electronics (ICCE), 2013
A hardware Trojan has become a serious problem of consumer electronics in recent years. The present study proposes a new hardware Trojan in a countermeasure circuit and evaluates the weakness of the countermeasure circuit through simulation experiments.
Masaya Yoshikawa   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy