Results 21 to 30 of about 809,010 (236)
The chances of detecting a malicious reliability attack induced by an offshore foundry are grim. The hardware Trojans affecting a circuit’s reliability do not tend to alter the circuit layout. These Trojans often manifest as an increased delay in certain
Navya Mohan, J. P. Anita
doaj +1 more source
Trojan-D2: Post-Layout Design and Detection of Stealthy Hardware Trojans - a RISC-V Case Study
With the exponential increase in the popularity of the RISC-V ecosystem, the security of this platform must be re-evaluated especially for mission-critical and IoT devices.
Sajjad Parvin +3 more
semanticscholar +1 more source
Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties) pose major security concerns, especially ...
K. Xiao +5 more
openaire +2 more sources
Scalable Activation of Rare Triggers in Hardware Trojans by Repeated Maximal Clique Sampling
Hardware Trojans are serious threat to security and reliability of computing systems. It is hard to detect these malicious implants using traditional validation methods since an adversary is likely to hide them under rare trigger conditions.
Yangdi Lyu, P. Mishra
semanticscholar +1 more source
Overview of the detection and prevention study of hardware Trojans
The design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which ...
Qiang XU,Xing-hao JIANG1,Li-hong YAO +1 more
doaj +3 more sources
Detecting Hardware Trojans in PCBs Using Side Channel Loopbacks
Malicious modifications to printed circuit boards (PCBs) are known as hardware Trojans. These may arise when malafide third parties alter PCBs premanufacturing or postmanufacturing and are a concern in safety-critical applications, such as industrial ...
H. Pearce +5 more
semanticscholar +1 more source
Indirect signs method for detecting hardware threats of technical means
The use of foreign computer-aided design (CAD) systems and debugging of IP-blocks in the development of ultra-large integrated circuits (VLSI) are associated with the risks of the appearance of "Trojans", not declared by developers of software and ...
Anatoliy A. Chuprinov, Dmitry O. Smirnov
doaj +1 more source
Design and detection of hardware Trojan based on satisfiability don't cares
Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.A new security threat of lightweight stealthy hardware Trojans leveraging discrete ...
Lingjuan WU +4 more
doaj +3 more sources
Preventing Soft Errors and Hardware Trojans in RISC-V Cores
Soft errors in embedded systems’ memories like single-event upsets and multiple-bit upsets lead to data and instruction corruption. Therefore, devices deployed in harsh environments, such as space, use fault-tolerant processors or redundancy methods to ...
Edian B. Annink +6 more
semanticscholar +1 more source
IMPLEMENTATION OF A HARDWARE TROJAN CHIP DETECTOR MODEL USING ARDUINO MICROCONTROLLER [PDF]
These days, hardware devices and its associated activities are greatly impacted by threats amidst of various technologies. Hardware trojans are malicious modifications made to the circuitry of an integrated circuit, Exploiting such alterations and ...
Kadeejah ABDULSALAM +2 more
doaj +1 more source

