Results 31 to 40 of about 809,010 (236)

Creation and detection of hardware trojans using non-invasive off-the-shelf technologies [PDF]

open access: yes, 2018
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans.
Bellekens, Xavier   +2 more
core   +5 more sources

A security method of hardware Trojan detection using path tracking algorithm

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to the globalization of IC design and manufacturing.
Der-Chen Huang   +3 more
doaj   +1 more source

Ten years of hardware Trojans: a survey from the attacker's perspective

open access: yesIET Computers & Digital Techniques, 2020
Hardware Trojan detection techniques have been studied extensively. However, to develop reliable and effective defenses, it is important to figure out how hardware Trojans are implemented in practical scenarios.
Mingfu Xue   +4 more
semanticscholar   +1 more source

Research on Defense Technology Against Hardware Trojans in Integrated Circuits [PDF]

open access: yesJisuanji gongcheng, 2016
With the further improvement of design,manufacture and test separation in Integrated Circuits(IC),hardware trojans can be implemented as modifications to IC,and it raises numerous concerns regarding possible threats.This paper briefly explains the ...
ZHAO Yiqiang,HE Jiaji,YANG Song,LIU Shenfeng
doaj   +1 more source

Hardware Trojans in Quantum Circuits, Their Impacts, and Defense [PDF]

open access: yesIEEE International Symposium on Quality Electronic Design
The reliability of the outcome of a quantum circuit in near-term noisy quantum computers depends on the gate count and depth for a given problem. Circuits with a short depth and lower gate count can yield the correct solution more often than the variant ...
Rupshali Roy, Subrata Das, Swaroop Ghosh
semanticscholar   +1 more source

Verification of serialising instructions for security against transient execution attacks

open access: yesIET Computers & Digital Techniques, 2023
Transient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side‐channels.
Kushal K. Ponugoti   +2 more
doaj   +1 more source

Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj   +3 more sources

System-level protection and hardware Trojan detection using weighted voting

open access: yesJournal of Advanced Research, 2014
The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during ...
Hany A.M. Amin   +2 more
doaj   +1 more source

Scalable Hardware Trojan Diagnosis [PDF]

open access: yesIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2012
Hardware Trojans (HTs) pose a significant threat to the modern and pending integrated circuit (IC). Due to the diversity of HTs and intrinsic process variation (PV) in IC design, detecting and locating HTs is challenging. Several approaches have been proposed to address the problem, but they are either incapable of detecting various types of HTs or ...
Sheng Wei, Miodrag Potkonjak
openaire   +1 more source

Home - About - Disclaimer - Privacy