Results 181 to 190 of about 809,010 (236)
Some of the next articles are maybe not open access.

Countermeasures Against Hardware Trojans

2020
This section is essentially a systematized review of the results of studies dedicated to methods of counteracting hardware Trojans in microcircuits. It should be said from the very beginning that there are no such countermeasures that would ensure absolute protection from such threats.
Anatoly Belous, Vitali Saladukha
openaire   +1 more source

Hardware Trojans in Microcircuits

2020
This chapter is an overview dedicated to detailed analysis of structures and mechanisms of operation of hardware Trojans in modern microcircuits. The beginning of the chapter describes theoretical basis of designing safe electronic equipment for critical applications and the first documented facts of detection of hardware Trojans in critical ...
Anatoly Belous, Vitali Saladukha
openaire   +1 more source

Trustworthy Hardware: Identifying and Classifying Hardware Trojans

Computer, 2010
For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
Ramesh Karri   +3 more
openaire   +1 more source

Hardware Trojans Detection at Register Transfer Level Based on Machine Learning

International Symposium on Circuits and Systems, 2019
To accurately detect Hardware Trojans in integrated circuits design process, a machine-learning-based detection method at the register transfer level (RTL) is proposed.
Tao Han, Yuze Wang, Peng Liu
semanticscholar   +1 more source

Exposing Hardware Trojans in Embedded Platforms via Short-Term Aging

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020
We demonstrate a novel technique that employs transistor short-term aging effects in integrated circuits (ICs) to detect hardware Trojans in embedded systems.
Virinchi Roy Surabhi   +5 more
semanticscholar   +1 more source

Towards Hardware Trojan: Problem Analysis and Trojan Simulation

2010 2nd International Conference on Information Engineering and Computer Science, 2010
Similar to the software viruses, hardware Trojan can also do harm to electronic systems. Specially, in military and defense-related systems, hardware security problem is an important aspect in these applications. In this paper, we analyze characteristics of hardware Trojans and implement three hardware Trojans on our hardware Trojan simulation platform
Song Yun   +3 more
openaire   +1 more source

Detection of Hardware Trojans in SystemC HLS Designs via Coverage-guided Fuzzing

Design, Automation and Test in Europe, 2019
High-level Synthesis (HLS) is being increasingly adopted as a mean to raise design productivity. HLS designs, which can be automatically translated into RTL, are typically written in SystemC at a more abstract level.
H. M. Le   +3 more
semanticscholar   +1 more source

Hardware Trojan vulnerability

2018
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single ...
openaire   +2 more sources

Control-Lock: Securing Processor Cores Against Software-Controlled Hardware Trojans

ACM Great Lakes Symposium on VLSI, 2019
Malicious circuit modifications known as hardware Trojans represent a rising threat to the integrated circuit supply chain. As many Trojans are activated based on a specific sequence of circuit states, we have recognized the ease of utilizing an ...
Dominik Sisejkovic   +4 more
semanticscholar   +1 more source

Trojan Scanner: Detecting Hardware Trojans with Rapid SEM Imaging Combined with Image Processing and Machine Learning

ISTFA 2018: Conference Proceedings from the 44th International Symposium for Testing and Failure Analysis, 2018
Hardware Trojans are malicious changes to the design of integrated circuits (ICs) at different stages of the design and fabrication processes. Different approaches have been developed to detect Trojans namely non-destructive (electrical tests like run ...
Nidish Vashistha   +7 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy