Results 21 to 30 of about 8,384 (195)

IMPLEMENTATION OF A HARDWARE TROJAN CHIP DETECTOR MODEL USING ARDUINO MICROCONTROLLER [PDF]

open access: yesApplied Computer Science, 2021
These days, hardware devices and its associated activities are greatly impacted by threats amidst of various technologies. Hardware trojans are malicious modifications made to the circuitry of an integrated circuit, Exploiting such alterations and ...
Kadeejah ABDULSALAM   +2 more
doaj   +1 more source

An Unsupervised Detection Approach for Hardware Trojans

open access: yesIEEE Access, 2020
With the booming development of the cyber-physical system, human society is much more dependent on information technology. Unfortunately, like software, hardware is not trusted at all, due to so many third parties involved in the separated integrated ...
Chen Dong   +5 more
doaj   +1 more source

Creation and detection of hardware trojans using non-invasive off-the-shelf technologies [PDF]

open access: yes, 2018
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans.
Bellekens, Xavier   +2 more
core   +5 more sources

A security method of hardware Trojan detection using path tracking algorithm

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to the globalization of IC design and manufacturing.
Der-Chen Huang   +3 more
doaj   +1 more source

Scalable Hardware Trojan Diagnosis [PDF]

open access: yesIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2012
Hardware Trojans (HTs) pose a significant threat to the modern and pending integrated circuit (IC). Due to the diversity of HTs and intrinsic process variation (PV) in IC design, detecting and locating HTs is challenging. Several approaches have been proposed to address the problem, but they are either incapable of detecting various types of HTs or ...
Sheng Wei 0001, Miodrag Potkonjak
openaire   +1 more source

Research on Defense Technology Against Hardware Trojans in Integrated Circuits [PDF]

open access: yesJisuanji gongcheng, 2016
With the further improvement of design,manufacture and test separation in Integrated Circuits(IC),hardware trojans can be implemented as modifications to IC,and it raises numerous concerns regarding possible threats.This paper briefly explains the ...
ZHAO Yiqiang,HE Jiaji,YANG Song,LIU Shenfeng
doaj   +1 more source

Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj   +3 more sources

Verification of serialising instructions for security against transient execution attacks

open access: yesIET Computers & Digital Techniques, 2023
Transient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side‐channels.
Kushal K. Ponugoti   +2 more
doaj   +1 more source

System-level protection and hardware Trojan detection using weighted voting

open access: yesJournal of Advanced Research, 2014
The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during ...
Hany A.M. Amin   +2 more
doaj   +1 more source

A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Due to technical barriers and economic costs, malicious circuits, known as hardware Trojans, are easily implanted in the complicated integrated circuit design and manufacturing process, which can lead to many disastrous consequences, such as denial of ...
Dong Cheng   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy