Results 71 to 80 of about 809,010 (236)
Hardware Trojans (HTs) are malicious hardware components designed to leak confidential information or cause the chip/circuit on which they are integrated to malfunction during operation.
Zeyu Li +4 more
doaj +1 more source
Creating a Backscattering Side Channel to Enable Detection of Dormant Hardware Trojans
This paper describes a new physical side channel, i.e., the backscattering side channel, created by transmitting a signal toward the integrated circuits (ICs), where the internal impedance changes caused by on-chip switching activity modulate the signal ...
Luong N. Nguyen +3 more
semanticscholar +1 more source
Amplitude-Modulating Analog/RF Hardware Trojans in Wireless Networks: Risks and Remedies
We investigate the risk posed by amplitude-modulating analog/RF hardware Trojans in wireless networks and propose a defense mechanism to mitigate the threat.
K. S. Subramani +4 more
semanticscholar +1 more source
Quantum Key Distribution Networks Design: Overview and Challenges
This paper explores the potential of using established QKD network design techniques in the context of quantum key distribution, which is based on the principles of quantum mechanics. ABSTRACT Quantum cryptography has increasingly attracted interest from both industry and academia for its potential in real‐world applications.
Pankaj Kumar +2 more
wiley +1 more source
Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan +3 more
wiley +1 more source
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
Reverse engineering of integrated circuits, i.e., understanding the internals of Integrated Circuits (ICs), is required for many benign and malicious applications.
Nils Albartus +4 more
doaj +1 more source
Hardware Trojans in Reconfigurable Computing [PDF]
The design flow for field-programmable gate arrays (FPGAs), besides conventional methods of inserting Trojans into a design by a malicious entity, can also be surreptitiously compromised to assist an attacker to perform a successful malfunctioning or information leakage attack.
openaire +1 more source
Rapid digital adoption in Nigeria has been accompanied by rising cybercrime; a 2021 Sophos survey found 71% of Nigerian organizations experienced cyberattacks, 44% of which paid ransoms averaging USD 3.43 million. The integration of emerging technologies (artificial intelligence, blockchain, Internet of Things, and 5G) offers transformative ...
Goddy Uwa Osimen +5 more
wiley +1 more source
A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities.
Zichu Liu +3 more
doaj +1 more source
A proactive, predictive, and integrative framework that integrates multi‐omics innovations with ecological modeling and big data analytics to guide adaptive interventions and governance in invasive species management. By integrating multi‐omics insights with advanced ecological modeling, remote sensing, artificial intelligence, and cross‐disciplinary ...
Aibin Zhan
wiley +1 more source

