Results 11 to 20 of about 8,384 (195)
Hardware Trojans in Reconfigurable Computing [PDF]
Wettstreit zwischen der Entwicklung neuer Hardwaretrojaner und entsprechender Gegenmaßnahmen beschreiten Widersacher immer raffiniertere Wege um Schaltungsentwürfe zu infizieren und dabei selbst fortgeschrittene Test- und Verifikationsmethoden zu überlisten.
openaire +3 more sources
Hardware Trojan with Frequency Modulation [PDF]
The use of third-party IP cores in implementing applications in FPGAs has given rise to the threat of malicious alterations through the insertion of hardware Trojans. To address this threat, it is important to predict the way hardware Trojans are built and to identify their weaknesses.
Ash Luft, Mihai Sima, Michael McGuire
openaire +2 more sources
Hardware Trojan Detection of IP Soft Cores Based on Feature Matching [PDF]
The introduction of uncontrolled third-party IP soft core introduced in the process of integrated circuit design can easily be embedded with hardware trojans.Traditional,functional testing method is difficult to achieve full coverage detection.So,the ...
NI Lin,SHI Lei,HAN Kun,LI Shaoqing
doaj +1 more source
RF Analog Hardware Trojan Detection Through Electromagnetic Side-Channel
With the advent of globalization, hardware trojans provide an ever-present threat to the security of devices. Much of the research to date has centered around documenting and providing detection methods for digital trojans.
John Kan +5 more
doaj +1 more source
The Study on Hardware Security and Its Defense Measures [PDF]
With the globalization of the IC design supply chain and the universal interconnection of computers, the problem of hardware security has become increasingly prominent.
He Yang
doaj +1 more source
The chances of detecting a malicious reliability attack induced by an offshore foundry are grim. The hardware Trojans affecting a circuit’s reliability do not tend to alter the circuit layout. These Trojans often manifest as an increased delay in certain
Navya Mohan, J. P. Anita
doaj +1 more source
Overview of the detection and prevention study of hardware Trojans
The design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which ...
Qiang XU,Xing-hao JIANG1,Li-hong YAO +1 more
doaj +3 more sources
Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction ...
Sarwono Sutikno +3 more
doaj +1 more source
Indirect signs method for detecting hardware threats of technical means
The use of foreign computer-aided design (CAD) systems and debugging of IP-blocks in the development of ultra-large integrated circuits (VLSI) are associated with the risks of the appearance of "Trojans", not declared by developers of software and ...
Anatoliy A. Chuprinov, Dmitry O. Smirnov
doaj +1 more source
Design and detection of hardware Trojan based on satisfiability don't cares
Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.A new security threat of lightweight stealthy hardware Trojans leveraging discrete ...
Lingjuan WU +4 more
doaj +3 more sources

