Results 41 to 50 of about 809,010 (236)
Due to technical barriers and economic costs, malicious circuits, known as hardware Trojans, are easily implanted in the complicated integrated circuit design and manufacturing process, which can lead to many disastrous consequences, such as denial of ...
Dong Cheng +5 more
doaj +1 more source
A Multi-Layer Hardware Trojan Protection Framework for IoT Chips
Since integrated circuits are performed by several untrusted manufacturers, malicious circuits (hardware Trojans) can be implanted in any stage of the Internet-of-Things (IoT) devices.
Chen Dong +4 more
doaj +1 more source
A Chip Architecture for Compressive Sensing Based Detection of IC Trojans [PDF]
We present a chip architecture for a compressive sensing based method that can be used in conjunction with the JTAG standard to detect IC Trojans. The proposed architecture compresses chip output resulting from a large number of test vectors applied to a
Chen, Liang-Gee +5 more
core +2 more sources
Hardware Trojan Dataset of RISC-V and Web3 Generated with ChatGPT-4
Although hardware trojans impose a relevant threat to the hardware security of RISC-V and Web3 applications, existing datasets have a limited set of examples, as the most famous hardware trojan dataset TrustHub has 106 different trojans.
Victor Takashi Hayashi +1 more
doaj +1 more source
With Cyber warfare, detection of hardware Trojans, malicious digital circuit components that can leak data and degrade performance, is an urgent issue. Quasi‐Delay Insensitive asynchronous digital circuits, such as NULL Convention Logic (NCL) and Sleep ...
Kushal K. Ponugoti +3 more
doaj +1 more source
ENTT/ENTTR: A Family of Improved Emerging NVM-Based Trojan Triggers and Resets
Hardware Trojans in Integrated Circuits (ICs), that are inserted as hostile modifications in the design phase and/or the fabrication phase, are a security threat since the semiconductor manufacturing process is increasingly becoming globalized.
Karthikeyan Nagarajan +2 more
doaj +1 more source
A Survey on the Design, Detection, and Prevention of Pre-Silicon Hardware Trojans
The complexity of the semiconductor design lifecycle and globalized manufacturing process creates concern over the threat of deliberate malicious alterations, or hardware Trojans, being inserted into microelectronic designs.
Jonathan Cruz, Jason Hamlet
semanticscholar +1 more source
Hardware Trojan Detection through Information Flow Security Verification
Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints.
Contreras, Gustavo +5 more
core +1 more source
An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices
The exponential growth and widespread adoption of Internet of Things (IoT) devices have introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating advanced technological approaches to protect against emerging cyber threats ...
Amira Omar +3 more
semanticscholar +1 more source
Homomorphic Data Isolation for Hardware Trojan Protection
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr +4 more
core +1 more source

