Results 21 to 30 of about 8,384 (195)
IMPLEMENTATION OF A HARDWARE TROJAN CHIP DETECTOR MODEL USING ARDUINO MICROCONTROLLER [PDF]
These days, hardware devices and its associated activities are greatly impacted by threats amidst of various technologies. Hardware trojans are malicious modifications made to the circuitry of an integrated circuit, Exploiting such alterations and ...
Kadeejah ABDULSALAM +2 more
doaj +1 more source
An Unsupervised Detection Approach for Hardware Trojans
With the booming development of the cyber-physical system, human society is much more dependent on information technology. Unfortunately, like software, hardware is not trusted at all, due to so many third parties involved in the separated integrated ...
Chen Dong +5 more
doaj +1 more source
Creation and detection of hardware trojans using non-invasive off-the-shelf technologies [PDF]
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans.
Bellekens, Xavier +2 more
core +5 more sources
A security method of hardware Trojan detection using path tracking algorithm
Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to the globalization of IC design and manufacturing.
Der-Chen Huang +3 more
doaj +1 more source
Scalable Hardware Trojan Diagnosis [PDF]
Hardware Trojans (HTs) pose a significant threat to the modern and pending integrated circuit (IC). Due to the diversity of HTs and intrinsic process variation (PV) in IC design, detecting and locating HTs is challenging. Several approaches have been proposed to address the problem, but they are either incapable of detecting various types of HTs or ...
Sheng Wei 0001, Miodrag Potkonjak
openaire +1 more source
Research on Defense Technology Against Hardware Trojans in Integrated Circuits [PDF]
With the further improvement of design,manufacture and test separation in Integrated Circuits(IC),hardware trojans can be implemented as modifications to IC,and it raises numerous concerns regarding possible threats.This paper briefly explains the ...
ZHAO Yiqiang,HE Jiaji,YANG Song,LIU Shenfeng
doaj +1 more source
Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj +3 more sources
Verification of serialising instructions for security against transient execution attacks
Transient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side‐channels.
Kushal K. Ponugoti +2 more
doaj +1 more source
System-level protection and hardware Trojan detection using weighted voting
The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during ...
Hany A.M. Amin +2 more
doaj +1 more source
Due to technical barriers and economic costs, malicious circuits, known as hardware Trojans, are easily implanted in the complicated integrated circuit design and manufacturing process, which can lead to many disastrous consequences, such as denial of ...
Dong Cheng +5 more
doaj +1 more source

