Results 171 to 180 of about 809,010 (236)
Some of the next articles are maybe not open access.
2016 8th International Symposium on Telecommunications (IST), 2016
Exploring possible vulnerabilities for making hardware Trojans helps designers to improve the security and trust of integrated circuits (ICs). This paper discusses the hardware Trojan possibility in SRAM to evaluate the security of SRAM and evaluates the effectiveness of existing detection methods.
Roghayeh Saeidi +1 more
openaire +1 more source
Exploring possible vulnerabilities for making hardware Trojans helps designers to improve the security and trust of integrated circuits (ICs). This paper discusses the hardware Trojan possibility in SRAM to evaluate the security of SRAM and evaluates the effectiveness of existing detection methods.
Roghayeh Saeidi +1 more
openaire +1 more source
AI Trojan Attack for Evading Machine Learning-Based Detection of Hardware Trojans
IEEE transactions on computersThe globalized semiconductor supply chain significantly increases the risk of exposing System-on-Chip (SoC) designs to hardware Trojans. While machine learning (ML) based Trojan detection approaches are promising due to their scalability as well as ...
Zhixin Pan, P. Mishra
semanticscholar +1 more source
Strategic Hardware Trojan Testing with Hierarchical Trojan Types
2021 55th Annual Conference on Information Sciences and Systems (CISS), 2021In this paper, we consider the problem of detecting hardware Trojans in an Integrated Circuit (IC) from a game theoretic standpoint. The paper considers the presence of multiple classes of Trojans, with each class containing multiple Trojan types, and characterizes the Nash Equilibrium (NE) strategy for inserting a Trojan (from the perspective of a ...
Swastik Brahma +2 more
openaire +1 more source
On Parametric Hardware Trojans
2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST), 2021With the eminence of third party foundry practice, insertion of hardware trojans in ICs is becoming a major threat. Insertion techniques of these hardware trojans are getting easier with sophisticated yet expensive equipment. The same very equipment which was basically used for IC surgeries is used for inserting hardware trojans.
openaire +1 more source
TROP: TRust-aware OPportunistic Routing in NoC with Hardware Trojans
ACM Trans. Design Autom. Electr. Syst.Multiple software and hardware intellectual property (IP) components are combined on a single chip to form Multi-Processor Systems-on-Chips (MPSoCs). Due to the rigid time-to-market constraints, some of the IPs are from outsourced third parties.
Syam Sankar +3 more
semanticscholar +1 more source
Hardware Trojans Detection Through RTL Features Extraction and Machine Learning
Asian Hardware-Oriented Security and Trust Symposium, 2021To ensure the hardware security of integrated circuits, especially considering third-party IP cores (3PIP cores) application in SoC design, a novel Hardware Trojan (HT) detection scheme aimed to Register Transfer Level (RTL) Description is proposed in ...
Jizhong Yang +5 more
semanticscholar +1 more source
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015
Hardware Trojan is a severe threat to the modern integrated circuits, which is posed by the IP business model and untrusted foundries. In most of the modern SoCs several block are licensed from third party IP vendor where the chances of Trojan insertion is high and Trojan can also be inserted in foundries which are all globalized generally untrusted ...
N. Ravi Kiran +3 more
openaire +1 more source
Hardware Trojan is a severe threat to the modern integrated circuits, which is posed by the IP business model and untrusted foundries. In most of the modern SoCs several block are licensed from third party IP vendor where the chances of Trojan insertion is high and Trojan can also be inserted in foundries which are all globalized generally untrusted ...
N. Ravi Kiran +3 more
openaire +1 more source
Advancing the State-of-the-Art in Hardware Trojans Detection
IEEE Transactions on Dependable and Secure Computing, 2019Over the past decade, Hardware Trojans (HTs) research community has made significant progress towards developing effective countermeasures for various types of HTs, yet these countermeasures are shown to be circumvented by sophisticated HTs designed ...
Syed Kamran Haider +5 more
semanticscholar +1 more source
2010
Over the last two decades we have become dependent on a network of electronic devices that supports a plethora of services, ranging from delivery of entertainment and news to maintenance of business records to filing of legal forms. This network provides a robust platform to handle all kinds of sensitive information at the personal, corporate, or ...
Mohammad Tehranipoor, Berk Sunar
openaire +1 more source
Over the last two decades we have become dependent on a network of electronic devices that supports a plethora of services, ranging from delivery of entertainment and news to maintenance of business records to filing of legal forms. This network provides a robust platform to handle all kinds of sensitive information at the personal, corporate, or ...
Mohammad Tehranipoor, Berk Sunar
openaire +1 more source
2011
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire +1 more source
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire +1 more source

