Results 21 to 30 of about 809,010 (236)

Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model

open access: yesCryptography, 2023
The chances of detecting a malicious reliability attack induced by an offshore foundry are grim. The hardware Trojans affecting a circuit’s reliability do not tend to alter the circuit layout. These Trojans often manifest as an increased delay in certain
Navya Mohan, J. P. Anita
doaj   +1 more source

Trojan-D2: Post-Layout Design and Detection of Stealthy Hardware Trojans - a RISC-V Case Study

open access: yesAsia and South Pacific Design Automation Conference, 2023
With the exponential increase in the popularity of the RISC-V ecosystem, the security of this platform must be re-evaluated especially for mission-critical and IoT devices.
Sajjad Parvin   +3 more
semanticscholar   +1 more source

Hardware Trojans [PDF]

open access: yesACM Transactions on Design Automation of Electronic Systems, 2016
Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties) pose major security concerns, especially ...
K. Xiao   +5 more
openaire   +2 more sources

Scalable Activation of Rare Triggers in Hardware Trojans by Repeated Maximal Clique Sampling

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021
Hardware Trojans are serious threat to security and reliability of computing systems. It is hard to detect these malicious implants using traditional validation methods since an adversary is likely to hide them under rare trigger conditions.
Yangdi Lyu, P. Mishra
semanticscholar   +1 more source

Overview of the detection and prevention study of hardware Trojans

open access: yes网络与信息安全学报, 2017
The design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which ...
Qiang XU,Xing-hao JIANG1,Li-hong YAO   +1 more
doaj   +3 more sources

Detecting Hardware Trojans in PCBs Using Side Channel Loopbacks

open access: yesIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2022
Malicious modifications to printed circuit boards (PCBs) are known as hardware Trojans. These may arise when malafide third parties alter PCBs premanufacturing or postmanufacturing and are a concern in safety-critical applications, such as industrial ...
H. Pearce   +5 more
semanticscholar   +1 more source

Indirect signs method for detecting hardware threats of technical means

open access: yesБезопасность информационных технологий, 2022
The use of foreign computer-aided design (CAD) systems and debugging of IP-blocks in the development of ultra-large integrated circuits (VLSI) are associated with the risks of the appearance of "Trojans", not declared by developers of software and ...
Anatoliy A. Chuprinov, Dmitry O. Smirnov
doaj   +1 more source

Design and detection of hardware Trojan based on satisfiability don't cares

open access: yes网络与信息安全学报, 2021
Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.A new security threat of lightweight stealthy hardware Trojans leveraging discrete ...
Lingjuan WU   +4 more
doaj   +3 more sources

Preventing Soft Errors and Hardware Trojans in RISC-V Cores

open access: yesIEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2022
Soft errors in embedded systems’ memories like single-event upsets and multiple-bit upsets lead to data and instruction corruption. Therefore, devices deployed in harsh environments, such as space, use fault-tolerant processors or redundancy methods to ...
Edian B. Annink   +6 more
semanticscholar   +1 more source

IMPLEMENTATION OF A HARDWARE TROJAN CHIP DETECTOR MODEL USING ARDUINO MICROCONTROLLER [PDF]

open access: yesApplied Computer Science, 2021
These days, hardware devices and its associated activities are greatly impacted by threats amidst of various technologies. Hardware trojans are malicious modifications made to the circuitry of an integrated circuit, Exploiting such alterations and ...
Kadeejah ABDULSALAM   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy