Results 51 to 60 of about 8,384 (195)

Neural Trojans

open access: yes, 2017
While neural networks demonstrate stronger capabilities in pattern recognition nowadays, they are also becoming larger and deeper. As a result, the effort needed to train a network also increases dramatically. In many cases, it is more practical to use a
Liu, Yuntao   +2 more
core   +1 more source

A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed   +4 more
wiley   +1 more source

Locating Hardware Trojans Using Combinatorial Testing for Cryptographic Circuits

open access: yesIEEE Access, 2022
This paper presents a novel method for locating combinational hardware Trojans (HT) based on fault location approaches used in combinatorial testing.
Ludwig Kampel   +2 more
doaj   +1 more source

ACTIC: A Large Language Model‐Based Method for Threat Intelligence Perception

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper proposes a study that introduces an automated method for constructing a threat intelligence knowledge graph construction method based on using large language models, named ACTIC. This approach utilises a locally deployed DeepSeek‐32B model and employs, combined with prompt engineering and Low‐Rank Adaptation (LoRA) fine‐tuning, to extract ...
Changcheng Liu, Changheng Yang, Jun Ma
wiley   +1 more source

Targeted modification of hardware trojans

open access: yesJournal of Hardware and Systems Security, 2019
The use of untrusted design tools, components, and designers, coupled with untrusted device fabrication, introduces the possibility of malicious modifications being made to integrated circuits (ICs) during their design and fabrication. These modifications are known as hardware trojans. The widespread use of commercially purchased 3rd party intellectual
Jason R. Hamlet   +2 more
openaire   +2 more sources

Digital IP Protection Using Threshold Voltage Control

open access: yes, 2016
This paper proposes a method to completely hide the functionality of a digital standard cell. This is accomplished by a differential threshold logic gate (TLG).
Davis, Joseph   +4 more
core   +1 more source

SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber‐Physical Systems Based on Elliptic Curve Cryptography

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley   +1 more source

Concerted Wire Lifting: Enabling Secure and Cost-Effective Split Manufacturing

open access: yes, 2018
Here we advance the protection of split manufacturing (SM)-based layouts through the judicious and well-controlled handling of interconnects. Initially, we explore the cost-security trade-offs of SM, which are limiting its adoption.
Ashraf, Mohammed   +3 more
core   +1 more source

Delay‐Scheduled Adaptive Observer Control Strategy for Nonlinear Systems With Time‐Varying Delays

open access: yesIET Control Theory &Applications, Volume 20, Issue 1, January/December 2026.
This paper proposes a delay‐scheduled adaptive observer controller for nonlinear systems with unknown time‐varying delays and bounded disturbances. By integrating an adaptive observer with an LMI‐based state‐feedback controller, the method ensures robust stability and H∞$H_\infty$ performance. Numerical simulations on delayed Lorenz and hyperchaotic Lü
Mohammad Ali Labbaf Khaniki   +1 more
wiley   +1 more source

DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Reverse engineering of integrated circuits, i.e., understanding the internals of Integrated Circuits (ICs), is required for many benign and malicious applications.
Nils Albartus   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy