Results 191 to 200 of about 809,010 (236)
Some of the next articles are maybe not open access.
Hardware Trojans in Electronic Devices
2020This chapter is a review of well-known hardware Trojans designed in order to be implemented into various electronic devices. Hardware and software Trojans in telecommunication systems (network equipment, firewalls routers, work servers, wireless works, and even operator workstations) are considered.
Anatoly Belous, Vitali Saladukha
openaire +1 more source
Ensemble-Learning-Based Hardware Trojans Detection Method by Detecting the Trigger Nets
International Symposium on Circuits and Systems, 2019With the globalization of integrated circuit (IC) design and manufacturing, malicious third-party vendors can easily insert hardware Trojans into their intellect property (IP) cores during IC design phase, threatening the security of IC systems.
Yuze Wang +3 more
semanticscholar +1 more source
The Hardware Trojan System: An Online Suite of Tools for Hardware Trojan Analysis
2017Hardware trojans are accidental or malicious modifications of integrated circuits. There is currently no accepted standard for describing trojans or the methods used to detect them. A taxonomic structure was recently proposed that is a viable candidate for standardization.
Nicholas Houghton +3 more
openaire +1 more source
Introduction to Hardware Trojans
2017Hardware Trojans are a major concern to the overall security and trust of any electronic system. These malicious modifications of circuits are designed to wreak havoc by altering the intended behavior of the system. When triggered, Trojans adversely affect electronics leading to reduced reliability, system failure, remote access into hardware ...
openaire +1 more source
Stealthy Dopant-Level Hardware Trojans
2013In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or critical-infrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad.
Georg T. Becker +3 more
openaire +1 more source

