Results 141 to 150 of about 8,384 (195)
Emerging Trends in Cybersecurity: A Holistic View on Current Threats, Assessing Solutions, and Pioneering New Frontiers. [PDF]
Zaid T, Garai S.
europepmc +1 more source
Efficient feature ranked hybrid framework for android Iot malware detection. [PDF]
Saeed NH +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Trustworthy Hardware: Identifying and Classifying Hardware Trojans
Computer, 2010For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
Ramesh Karri +2 more
exaly +2 more sources
2016 8th International Symposium on Telecommunications (IST), 2016
Exploring possible vulnerabilities for making hardware Trojans helps designers to improve the security and trust of integrated circuits (ICs). This paper discusses the hardware Trojan possibility in SRAM to evaluate the security of SRAM and evaluates the effectiveness of existing detection methods.
Roghayeh Saeidi +1 more
openaire +1 more source
Exploring possible vulnerabilities for making hardware Trojans helps designers to improve the security and trust of integrated circuits (ICs). This paper discusses the hardware Trojan possibility in SRAM to evaluate the security of SRAM and evaluates the effectiveness of existing detection methods.
Roghayeh Saeidi +1 more
openaire +1 more source
Implementing hardware Trojans: Experiences from a hardware Trojan challenge
2011 IEEE 29th International Conference on Computer Design (ICCD), 2011Hardware Trojans have become a growing concern in the design of secure integrated circuits. In this work, we present a set of novel hardware Trojans aimed at evading detection methods, designed as part of the CSAW Embedded System Challenge 2010. We introduced and implemented unique Trojans based on side-channel analysis that leak the secret key in the ...
Georg T. Becker +5 more
openaire +1 more source
Testability of Cryptographic Hardware and Detection of Hardware Trojans
2011 Asian Test Symposium, 2011Cryptographic algorithms are routinely used toper form computationally intense operations over increasingly larger volumes of data, and in order to meet the high throughput requirements of the applications, are often implemented by VLSI designs. The high complexity of such implementations raises concern about their reliability. In order to improve upon
Debdeep Mukhopadhyay +1 more
openaire +1 more source
2011 IEEE 17th International On-Line Testing Symposium, 2011
Driven by strong economic incentives the globalization of the semiconductor design and fabrication industries has given rise to numerous vulnerabilities in the manufacturing chain. From design to production countless hands contribute until fabrication is completed.
openaire +1 more source
Driven by strong economic incentives the globalization of the semiconductor design and fabrication industries has given rise to numerous vulnerabilities in the manufacturing chain. From design to production countless hands contribute until fabrication is completed.
openaire +1 more source
On Parametric Hardware Trojans
2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST), 2021With the eminence of third party foundry practice, insertion of hardware trojans in ICs is becoming a major threat. Insertion techniques of these hardware trojans are getting easier with sophisticated yet expensive equipment. The same very equipment which was basically used for IC surgeries is used for inserting hardware trojans.
exaly +2 more sources
Strategic Hardware Trojan Testing with Hierarchical Trojan Types
2021 55th Annual Conference on Information Sciences and Systems (CISS), 2021In this paper, we consider the problem of detecting hardware Trojans in an Integrated Circuit (IC) from a game theoretic standpoint. The paper considers the presence of multiple classes of Trojans, with each class containing multiple Trojan types, and characterizes the Nash Equilibrium (NE) strategy for inserting a Trojan (from the perspective of a ...
Swastik Brahma +2 more
openaire +1 more source
Hardware Trojan for security LSI
2013 IEEE International Conference on Consumer Electronics (ICCE), 2013A hardware Trojan has become a serious problem of consumer electronics in recent years. The present study proposes a new hardware Trojan in a countermeasure circuit and evaluates the weakness of the countermeasure circuit through simulation experiments.
Masaya Yoshikawa +2 more
openaire +1 more source

