Results 11 to 20 of about 809,010 (236)

A Deep Learning Approach in Optical Inspection to Detect Hidden Hardware Trojans and Secure Cybersecurity in Electronics Manufacturing Supply Chains

open access: yesFrontiers in Mechanical Engineering, 2021
Deep learning methods have been extensively studied and have been proven to be very useful in multiple fields of technology. This paper presents a deep learning approach to optically detect hidden hardware trojans in the manufacturing and assembly phase ...
Ameya Kulkarni, Chengying Xu
doaj   +2 more sources

ChipletQuake: On-Die Digital Impedance Sensing for Chiplet and Interposer Verification [PDF]

open access: yesSensors
The increasing complexity and cost of manufacturing monolithic chips have driven the semiconductor industry toward chiplet-based designs, where smaller, modular chiplets are integrated onto a single interposer.
Saleh Khalaj Monfared   +2 more
doaj   +2 more sources

A New Characterization of Hardware Trojans

open access: yesIEEE Access, 2016
This paper examines hardware trojan threats to semiconductor chips, which is particularly important for chips intended for vital infrastructure and critical applications.
Samer Moein   +3 more
doaj   +3 more sources

Security Closure of IC Layouts Against Hardware Trojans [PDF]

open access: yesACM International Symposium on Physical Design, 2022
Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many threats, like piracy of IC intellectual property or insertion of hardware ...
Fangzhou Wang   +9 more
semanticscholar   +1 more source

Hardware Trojan Detection Based on Long Short-Term Memory Neural Network [PDF]

open access: yesJisuanji gongcheng, 2020
Hardware Trojans pose a huge threat to the reliability of integrated circuit chips.Therefore,this paper proposes a hardware Trojan detection method based on Principal Component Analysis(PCA) and Long Short-Term Memory(LSTM) neural network.The method uses
HU Tao, DIAN Songyi, JIANG Ronghua
doaj   +1 more source

Implantation and Detection of a Sequential Bus Hardware Trojan [PDF]

open access: yesJisuanji gongcheng, 2021
RS bus integrated circuit has been widely used in aerospace and industrial control.With the hardware Trojan detection for integrated circuits becoming a research hotspot,as a branch of bus hardware Trojan research field,its design has been paid more and ...
HUANG Jiaoying, LI Shengyu, GAO Cheng, YANG Daming
doaj   +1 more source

Hardware Trojan Detection of IP Soft Cores Based on Feature Matching [PDF]

open access: yesJisuanji gongcheng, 2017
The introduction of uncontrolled third-party IP soft core introduced in the process of integrated circuit design can easily be embedded with hardware trojans.Traditional,functional testing method is difficult to achieve full coverage detection.So,the ...
NI Lin,SHI Lei,HAN Kun,LI Shaoqing
doaj   +1 more source

The Study on Hardware Security and Its Defense Measures [PDF]

open access: yesSHS Web of Conferences, 2022
With the globalization of the IC design supply chain and the universal interconnection of computers, the problem of hardware security has become increasingly prominent.
He Yang
doaj   +1 more source

RF Analog Hardware Trojan Detection Through Electromagnetic Side-Channel

open access: yesIEEE Open Journal of Circuits and Systems, 2022
With the advent of globalization, hardware trojans provide an ever-present threat to the security of devices. Much of the research to date has centered around documenting and providing detection methods for digital trojans.
John Kan   +5 more
doaj   +1 more source

Information Flow Tracking Methods for Protecting Cyber-Physical Systems against Hardware Trojans - a Survey [PDF]

open access: yesarXiv.org, 2022
—Cyber-physical systems (CPS) provide profitable surfaces for hardware attacks such as hardware Trojans. Hardware Trojans can implement stealthy attacks such as leaking critical information, taking control of devices or harm humans.
Sofia Maragkou, A. Jantsch
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy