Results 191 to 200 of about 809,010 (236)
Some of the next articles are maybe not open access.

Hardware Trojans in Electronic Devices

2020
This chapter is a review of well-known hardware Trojans designed in order to be implemented into various electronic devices. Hardware and software Trojans in telecommunication systems (network equipment, firewalls routers, work servers, wireless works, and even operator workstations) are considered.
Anatoly Belous, Vitali Saladukha
openaire   +1 more source

Ensemble-Learning-Based Hardware Trojans Detection Method by Detecting the Trigger Nets

International Symposium on Circuits and Systems, 2019
With the globalization of integrated circuit (IC) design and manufacturing, malicious third-party vendors can easily insert hardware Trojans into their intellect property (IP) cores during IC design phase, threatening the security of IC systems.
Yuze Wang   +3 more
semanticscholar   +1 more source

Hardware Trojans

2022
Dominik Sisejkovic, Rainer Leupers
openaire   +1 more source

Hardware-Trojaner

Datenschutz und Datensicherheit - DuD, 2020
Julian Speith   +4 more
openaire   +1 more source

The Hardware Trojan System: An Online Suite of Tools for Hardware Trojan Analysis

2017
Hardware trojans are accidental or malicious modifications of integrated circuits. There is currently no accepted standard for describing trojans or the methods used to detect them. A taxonomic structure was recently proposed that is a viable candidate for standardization.
Nicholas Houghton   +3 more
openaire   +1 more source

Hardware Trojan

2023
Steffen Becker, Christof Paar
openaire   +1 more source

Hardware Trojan Detection

2023
Mark Tehranipoor   +2 more
openaire   +1 more source

Introduction to Hardware Trojans

2017
Hardware Trojans are a major concern to the overall security and trust of any electronic system. These malicious modifications of circuits are designed to wreak havoc by altering the intended behavior of the system. When triggered, Trojans adversely affect electronics leading to reduced reliability, system failure, remote access into hardware ...
openaire   +1 more source

Stealthy Dopant-Level Hardware Trojans

2013
In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or critical-infrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad.
Georg T. Becker   +3 more
openaire   +1 more source

Hardware Trojan Insertion

2023
Mark Tehranipoor   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy