Results 31 to 40 of about 8,384 (195)

A Multi-Layer Hardware Trojan Protection Framework for IoT Chips

open access: yesIEEE Access, 2019
Since integrated circuits are performed by several untrusted manufacturers, malicious circuits (hardware Trojans) can be implanted in any stage of the Internet-of-Things (IoT) devices.
Chen Dong   +4 more
doaj   +1 more source

Illegal Trojan design and detection in asynchronous NULL Convention Logic and Sleep Convention Logic circuits

open access: yesIET Computers & Digital Techniques, 2022
With Cyber warfare, detection of hardware Trojans, malicious digital circuit components that can leak data and degrade performance, is an urgent issue. Quasi‐Delay Insensitive asynchronous digital circuits, such as NULL Convention Logic (NCL) and Sleep ...
Kushal K. Ponugoti   +3 more
doaj   +1 more source

Hardware Trojan Detection through Information Flow Security Verification

open access: yes, 2017
Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints.
Contreras, Gustavo   +5 more
core   +1 more source

Hardware Trojan Dataset of RISC-V and Web3 Generated with ChatGPT-4

open access: yesData
Although hardware trojans impose a relevant threat to the hardware security of RISC-V and Web3 applications, existing datasets have a limited set of examples, as the most famous hardware trojan dataset TrustHub has 106 different trojans.
Victor Takashi Hayashi   +1 more
doaj   +1 more source

ENTT/ENTTR: A Family of Improved Emerging NVM-Based Trojan Triggers and Resets

open access: yesFrontiers in Nanotechnology, 2022
Hardware Trojans in Integrated Circuits (ICs), that are inserted as hostile modifications in the design phase and/or the fabrication phase, are a security threat since the semiconductor manufacturing process is increasingly becoming globalized.
Karthikeyan Nagarajan   +2 more
doaj   +1 more source

A Chip Architecture for Compressive Sensing Based Detection of IC Trojans [PDF]

open access: yes, 2012
We present a chip architecture for a compressive sensing based method that can be used in conjunction with the JTAG standard to detect IC Trojans. The proposed architecture compresses chip output resulting from a large number of test vectors applied to a
Chen, Liang-Gee   +5 more
core   +2 more sources

Hardware Trojans detection through automatic properties extraction and formal verification

open access: yesXibei Gongye Daxue Xuebao
To address the difficulties in obtaining golden reference models and the low accuracy when conducting pre-silicon hardware Trojans detection on a large-scale integrated circuit design, a formal detection method to quickly and accurately locate hardware ...
DAI Xiaojie   +3 more
doaj   +1 more source

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

Hardware Trojan Identification and Detection

open access: yesInternational Journal on Cryptography and Information Security, 2017
ABSTRACT The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques.
Moein, Samer   +3 more
openaire   +1 more source

A Deep Learning Approach in Optical Inspection to Detect Hidden Hardware Trojans and Secure Cybersecurity in Electronics Manufacturing Supply Chains

open access: yesFrontiers in Mechanical Engineering, 2021
Deep learning methods have been extensively studied and have been proven to be very useful in multiple fields of technology. This paper presents a deep learning approach to optically detect hidden hardware trojans in the manufacturing and assembly phase ...
Ameya Kulkarni, Chengying Xu
doaj   +1 more source

Home - About - Disclaimer - Privacy