Results 161 to 170 of about 8,384 (195)
Some of the next articles are maybe not open access.

Improving hardware Trojan detection by retiming

Microprocessors and Microsystems, 2015
Abstract Hardware Trojan horses (HTHs) are challenging threats to the security of silicon chips. A promising solution is path-delay fingerprinting for HTH detection. This paper presents trust-driven retiming ( TDR ) , a synthesis approach to provide a circuit which can be analyzed more effectively by delay fingerprinting.
Seyed Mohammad Hossein Shekarian   +1 more
openaire   +1 more source

Hardware Trojan vulnerability

2018
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single ...
openaire   +2 more sources

Hardware Trojan Horses

2010
Over the last two decades we have become dependent on a network of electronic devices that supports a plethora of services, ranging from delivery of entertainment and news to maintenance of business records to filing of legal forms. This network provides a robust platform to handle all kinds of sensitive information at the personal, corporate, or ...
Mohammad Tehranipoor, Berk Sunar
openaire   +1 more source

Hardware Trojans

2022
Dominik Sisejkovic, Rainer Leupers
openaire   +1 more source

Introduction to Hardware Trojans

2017
Hardware Trojans are a major concern to the overall security and trust of any electronic system. These malicious modifications of circuits are designed to wreak havoc by altering the intended behavior of the system. When triggered, Trojans adversely affect electronics leading to reduced reliability, system failure, remote access into hardware ...
openaire   +1 more source

Hardware Trojan

2023
Steffen Becker, Christof Paar
openaire   +1 more source

HaTCh: Hardware Trojan Catcher

IACR Cryptol. ePrint Arch., 2014
Syed Kamran Haider   +5 more
openaire   +2 more sources

Runtime Identification of Hardware Trojans by Feature Analysis on Gate-Level Unstructured Data and Anomaly Detection

ACM Transactions on Design Automation of Electronic Systems, 2020
Arunkumar Vijayan   +2 more
exaly  

Hardware Trojans

2013
Christian Krieg   +4 more
openaire   +1 more source

Hardware Trojan Insertion

2023
Mark Tehranipoor   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy