Results 161 to 170 of about 809,010 (236)
Some of the next articles are maybe not open access.
Benchmarking of Hardware Trojans and Maliciously Affected Circuits
Journal of Hardware and Systems Security, 2017Bicky Shakya +5 more
semanticscholar +3 more sources
Hardware Trojans in eNVM Neuromorphic Devices
Design, Automation and Test in Europe, 2023Fast and energy-efficient execution of a DNN on traditional CPU- and GPU-based architectures is challenging due to excessive data movement and inefficient computation.
Lingxi Wu +5 more
semanticscholar +1 more source
Design of AI Trojans for Evading Machine Learning-based Detection of Hardware Trojans
Design, Automation and Test in Europe, 2022The globalized semiconductor supply chain significantly increases the risk of exposing System-on-Chip (SoC) designs to malicious implants, popularly known as hardware Trojans.
Zhixin Pan, P. Mishra
semanticscholar +1 more source
Design of Hardware Trojans and its Impact on CPS Systems: A Comprehensive Survey
International Symposium on Circuits and Systems, 2021The ever-increasing demand for sophisticated cyber- physical systems (CPS), combined with the fabless model, led to vulnerability exploits in the IC supply chain, especially the insertion of hardware Trojans (HTs).
Abhijitt Dhavlle +3 more
semanticscholar +1 more source
RLocHT: A Hardware Trojans Localization Method Utilizing Deep Learning at the Gate-Level
IEEE Joint International Information Technology and Artificial Intelligence Conference, 2022Hardware is the foundation of the Cyber-Physical Systems, while the security threats brought by the hardware Tro-jan can make disastrous consequences. There are various studies on detecting hardware Trojans, but in order to defend against the hardware ...
Yuanyuan Zhang +4 more
semanticscholar +1 more source
ACM International Conference on Computing Frontiers, 2021
This paper presents design and integration of four hardware Trojans (HTs) into a post-quantum-crypto-enhanced RISC-V micro-controller, which was taped-out in September 2020.
A. Hepp, G. Sigl
semanticscholar +1 more source
This paper presents design and integration of four hardware Trojans (HTs) into a post-quantum-crypto-enhanced RISC-V micro-controller, which was taped-out in September 2020.
A. Hepp, G. Sigl
semanticscholar +1 more source
BHT-NoC: Blaming Hardware Trojans in NoC Routers
IEEE design & test, 2022This article proposes hardware trojan attacks in networks-on-chip (NoCs) together with novel countermeasures with minimal performance degradation.
Bharat Bisht, Shirshendu Das
semanticscholar +1 more source
Implementing hardware Trojans: Experiences from a hardware Trojan challenge
2011 IEEE 29th International Conference on Computer Design (ICCD), 2011Hardware Trojans have become a growing concern in the design of secure integrated circuits. In this work, we present a set of novel hardware Trojans aimed at evading detection methods, designed as part of the CSAW Embedded System Challenge 2010. We introduced and implemented unique Trojans based on side-channel analysis that leak the secret key in the ...
Georg T. Becker +5 more
openaire +1 more source
Detecting Hardware Trojans Using Combined Self-Testing and Imaging
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021Hardware Trojans are malicious modifications in integrated circuits (ICs) with an intent to breach security and compromise the reliability of an electronic system.
Nidish Vashistha +5 more
semanticscholar +1 more source
A Survey on Recent Detection Methods of the Hardware Trojans
2021 3rd International Conference on Signal Processing and Communication (ICPSC), 2021Modern integrated circuit design contains various constraints from the frontend to the backend. In microelectronic systems hardware security is a major threat. Hardware Trojan (HT) plays a vital role in hardware security issues.
R. Naveenkumar +3 more
semanticscholar +1 more source

