Results 41 to 50 of about 809,010 (236)

A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Due to technical barriers and economic costs, malicious circuits, known as hardware Trojans, are easily implanted in the complicated integrated circuit design and manufacturing process, which can lead to many disastrous consequences, such as denial of ...
Dong Cheng   +5 more
doaj   +1 more source

A Multi-Layer Hardware Trojan Protection Framework for IoT Chips

open access: yesIEEE Access, 2019
Since integrated circuits are performed by several untrusted manufacturers, malicious circuits (hardware Trojans) can be implanted in any stage of the Internet-of-Things (IoT) devices.
Chen Dong   +4 more
doaj   +1 more source

A Chip Architecture for Compressive Sensing Based Detection of IC Trojans [PDF]

open access: yes, 2012
We present a chip architecture for a compressive sensing based method that can be used in conjunction with the JTAG standard to detect IC Trojans. The proposed architecture compresses chip output resulting from a large number of test vectors applied to a
Chen, Liang-Gee   +5 more
core   +2 more sources

Hardware Trojan Dataset of RISC-V and Web3 Generated with ChatGPT-4

open access: yesData
Although hardware trojans impose a relevant threat to the hardware security of RISC-V and Web3 applications, existing datasets have a limited set of examples, as the most famous hardware trojan dataset TrustHub has 106 different trojans.
Victor Takashi Hayashi   +1 more
doaj   +1 more source

Illegal Trojan design and detection in asynchronous NULL Convention Logic and Sleep Convention Logic circuits

open access: yesIET Computers & Digital Techniques, 2022
With Cyber warfare, detection of hardware Trojans, malicious digital circuit components that can leak data and degrade performance, is an urgent issue. Quasi‐Delay Insensitive asynchronous digital circuits, such as NULL Convention Logic (NCL) and Sleep ...
Kushal K. Ponugoti   +3 more
doaj   +1 more source

ENTT/ENTTR: A Family of Improved Emerging NVM-Based Trojan Triggers and Resets

open access: yesFrontiers in Nanotechnology, 2022
Hardware Trojans in Integrated Circuits (ICs), that are inserted as hostile modifications in the design phase and/or the fabrication phase, are a security threat since the semiconductor manufacturing process is increasingly becoming globalized.
Karthikeyan Nagarajan   +2 more
doaj   +1 more source

A Survey on the Design, Detection, and Prevention of Pre-Silicon Hardware Trojans

open access: yesIEEE Access
The complexity of the semiconductor design lifecycle and globalized manufacturing process creates concern over the threat of deliberate malicious alterations, or hardware Trojans, being inserted into microelectronic designs.
Jonathan Cruz, Jason Hamlet
semanticscholar   +1 more source

Hardware Trojan Detection through Information Flow Security Verification

open access: yes, 2017
Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints.
Contreras, Gustavo   +5 more
core   +1 more source

An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices

open access: yesIoT
The exponential growth and widespread adoption of Internet of Things (IoT) devices have introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating advanced technological approaches to protect against emerging cyber threats ...
Amira Omar   +3 more
semanticscholar   +1 more source

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy