Results 161 to 170 of about 809,010 (236)
Some of the next articles are maybe not open access.

Benchmarking of Hardware Trojans and Maliciously Affected Circuits

Journal of Hardware and Systems Security, 2017
Bicky Shakya   +5 more
semanticscholar   +3 more sources

Hardware Trojans in eNVM Neuromorphic Devices

Design, Automation and Test in Europe, 2023
Fast and energy-efficient execution of a DNN on traditional CPU- and GPU-based architectures is challenging due to excessive data movement and inefficient computation.
Lingxi Wu   +5 more
semanticscholar   +1 more source

Design of AI Trojans for Evading Machine Learning-based Detection of Hardware Trojans

Design, Automation and Test in Europe, 2022
The globalized semiconductor supply chain significantly increases the risk of exposing System-on-Chip (SoC) designs to malicious implants, popularly known as hardware Trojans.
Zhixin Pan, P. Mishra
semanticscholar   +1 more source

Design of Hardware Trojans and its Impact on CPS Systems: A Comprehensive Survey

International Symposium on Circuits and Systems, 2021
The ever-increasing demand for sophisticated cyber- physical systems (CPS), combined with the fabless model, led to vulnerability exploits in the IC supply chain, especially the insertion of hardware Trojans (HTs).
Abhijitt Dhavlle   +3 more
semanticscholar   +1 more source

RLocHT: A Hardware Trojans Localization Method Utilizing Deep Learning at the Gate-Level

IEEE Joint International Information Technology and Artificial Intelligence Conference, 2022
Hardware is the foundation of the Cyber-Physical Systems, while the security threats brought by the hardware Tro-jan can make disastrous consequences. There are various studies on detecting hardware Trojans, but in order to defend against the hardware ...
Yuanyuan Zhang   +4 more
semanticscholar   +1 more source

Tapeout of a RISC-V crypto chip with hardware trojans: a case-study on trojan design and pre-silicon detectability

ACM International Conference on Computing Frontiers, 2021
This paper presents design and integration of four hardware Trojans (HTs) into a post-quantum-crypto-enhanced RISC-V micro-controller, which was taped-out in September 2020.
A. Hepp, G. Sigl
semanticscholar   +1 more source

BHT-NoC: Blaming Hardware Trojans in NoC Routers

IEEE design & test, 2022
This article proposes hardware trojan attacks in networks-on-chip (NoCs) together with novel countermeasures with minimal performance degradation.
Bharat Bisht, Shirshendu Das
semanticscholar   +1 more source

Implementing hardware Trojans: Experiences from a hardware Trojan challenge

2011 IEEE 29th International Conference on Computer Design (ICCD), 2011
Hardware Trojans have become a growing concern in the design of secure integrated circuits. In this work, we present a set of novel hardware Trojans aimed at evading detection methods, designed as part of the CSAW Embedded System Challenge 2010. We introduced and implemented unique Trojans based on side-channel analysis that leak the secret key in the ...
Georg T. Becker   +5 more
openaire   +1 more source

Detecting Hardware Trojans Using Combined Self-Testing and Imaging

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021
Hardware Trojans are malicious modifications in integrated circuits (ICs) with an intent to breach security and compromise the reliability of an electronic system.
Nidish Vashistha   +5 more
semanticscholar   +1 more source

A Survey on Recent Detection Methods of the Hardware Trojans

2021 3rd International Conference on Signal Processing and Communication (ICPSC), 2021
Modern integrated circuit design contains various constraints from the frontend to the backend. In microelectronic systems hardware security is a major threat. Hardware Trojan (HT) plays a vital role in hardware security issues.
R. Naveenkumar   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy