Results 181 to 190 of about 809,010 (236)
Some of the next articles are maybe not open access.
Countermeasures Against Hardware Trojans
2020This section is essentially a systematized review of the results of studies dedicated to methods of counteracting hardware Trojans in microcircuits. It should be said from the very beginning that there are no such countermeasures that would ensure absolute protection from such threats.
Anatoly Belous, Vitali Saladukha
openaire +1 more source
Hardware Trojans in Microcircuits
2020This chapter is an overview dedicated to detailed analysis of structures and mechanisms of operation of hardware Trojans in modern microcircuits. The beginning of the chapter describes theoretical basis of designing safe electronic equipment for critical applications and the first documented facts of detection of hardware Trojans in critical ...
Anatoly Belous, Vitali Saladukha
openaire +1 more source
Trustworthy Hardware: Identifying and Classifying Hardware Trojans
Computer, 2010For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
Ramesh Karri +3 more
openaire +1 more source
Hardware Trojans Detection at Register Transfer Level Based on Machine Learning
International Symposium on Circuits and Systems, 2019To accurately detect Hardware Trojans in integrated circuits design process, a machine-learning-based detection method at the register transfer level (RTL) is proposed.
Tao Han, Yuze Wang, Peng Liu
semanticscholar +1 more source
Exposing Hardware Trojans in Embedded Platforms via Short-Term Aging
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020We demonstrate a novel technique that employs transistor short-term aging effects in integrated circuits (ICs) to detect hardware Trojans in embedded systems.
Virinchi Roy Surabhi +5 more
semanticscholar +1 more source
Towards Hardware Trojan: Problem Analysis and Trojan Simulation
2010 2nd International Conference on Information Engineering and Computer Science, 2010Similar to the software viruses, hardware Trojan can also do harm to electronic systems. Specially, in military and defense-related systems, hardware security problem is an important aspect in these applications. In this paper, we analyze characteristics of hardware Trojans and implement three hardware Trojans on our hardware Trojan simulation platform
Song Yun +3 more
openaire +1 more source
Detection of Hardware Trojans in SystemC HLS Designs via Coverage-guided Fuzzing
Design, Automation and Test in Europe, 2019High-level Synthesis (HLS) is being increasingly adopted as a mean to raise design productivity. HLS designs, which can be automatically translated into RTL, are typically written in SystemC at a more abstract level.
H. M. Le +3 more
semanticscholar +1 more source
2018
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single ...
openaire +2 more sources
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single ...
openaire +2 more sources
Control-Lock: Securing Processor Cores Against Software-Controlled Hardware Trojans
ACM Great Lakes Symposium on VLSI, 2019Malicious circuit modifications known as hardware Trojans represent a rising threat to the integrated circuit supply chain. As many Trojans are activated based on a specific sequence of circuit states, we have recognized the ease of utilizing an ...
Dominik Sisejkovic +4 more
semanticscholar +1 more source
ISTFA 2018: Conference Proceedings from the 44th International Symposium for Testing and Failure Analysis, 2018
Hardware Trojans are malicious changes to the design of integrated circuits (ICs) at different stages of the design and fabrication processes. Different approaches have been developed to detect Trojans namely non-destructive (electrical tests like run ...
Nidish Vashistha +7 more
semanticscholar +1 more source
Hardware Trojans are malicious changes to the design of integrated circuits (ICs) at different stages of the design and fabrication processes. Different approaches have been developed to detect Trojans namely non-destructive (electrical tests like run ...
Nidish Vashistha +7 more
semanticscholar +1 more source

