Results 11 to 20 of about 8,384 (195)

Hardware Trojans in Reconfigurable Computing [PDF]

open access: yes2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), 2021
Wettstreit zwischen der Entwicklung neuer Hardwaretrojaner und entsprechender Gegenmaßnahmen beschreiten Widersacher immer raffiniertere Wege um Schaltungsentwürfe zu infizieren und dabei selbst fortgeschrittene Test- und Verifikationsmethoden zu überlisten.
openaire   +3 more sources

Hardware Trojan with Frequency Modulation [PDF]

open access: yes2021 IEEE 12th Latin America Symposium on Circuits and System (LASCAS), 2021
The use of third-party IP cores in implementing applications in FPGAs has given rise to the threat of malicious alterations through the insertion of hardware Trojans. To address this threat, it is important to predict the way hardware Trojans are built and to identify their weaknesses.
Ash Luft, Mihai Sima, Michael McGuire
openaire   +2 more sources

Hardware Trojan Detection of IP Soft Cores Based on Feature Matching [PDF]

open access: yesJisuanji gongcheng, 2017
The introduction of uncontrolled third-party IP soft core introduced in the process of integrated circuit design can easily be embedded with hardware trojans.Traditional,functional testing method is difficult to achieve full coverage detection.So,the ...
NI Lin,SHI Lei,HAN Kun,LI Shaoqing
doaj   +1 more source

RF Analog Hardware Trojan Detection Through Electromagnetic Side-Channel

open access: yesIEEE Open Journal of Circuits and Systems, 2022
With the advent of globalization, hardware trojans provide an ever-present threat to the security of devices. Much of the research to date has centered around documenting and providing detection methods for digital trojans.
John Kan   +5 more
doaj   +1 more source

The Study on Hardware Security and Its Defense Measures [PDF]

open access: yesSHS Web of Conferences, 2022
With the globalization of the IC design supply chain and the universal interconnection of computers, the problem of hardware security has become increasingly prominent.
He Yang
doaj   +1 more source

Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model

open access: yesCryptography, 2023
The chances of detecting a malicious reliability attack induced by an offshore foundry are grim. The hardware Trojans affecting a circuit’s reliability do not tend to alter the circuit layout. These Trojans often manifest as an increased delay in certain
Navya Mohan, J. P. Anita
doaj   +1 more source

Overview of the detection and prevention study of hardware Trojans

open access: yes网络与信息安全学报, 2017
The design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which ...
Qiang XU,Xing-hao JIANG1,Li-hong YAO   +1 more
doaj   +3 more sources

Detecting Unknown Hardware Trojans in Register Transfer Level Leveraging Verilog Conditional Branching Features

open access: yesIEEE Access, 2023
Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction ...
Sarwono Sutikno   +3 more
doaj   +1 more source

Indirect signs method for detecting hardware threats of technical means

open access: yesБезопасность информационных технологий, 2022
The use of foreign computer-aided design (CAD) systems and debugging of IP-blocks in the development of ultra-large integrated circuits (VLSI) are associated with the risks of the appearance of "Trojans", not declared by developers of software and ...
Anatoliy A. Chuprinov, Dmitry O. Smirnov
doaj   +1 more source

Design and detection of hardware Trojan based on satisfiability don't cares

open access: yes网络与信息安全学报, 2021
Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.A new security threat of lightweight stealthy hardware Trojans leveraging discrete ...
Lingjuan WU   +4 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy