Results 81 to 90 of about 8,384 (195)

Secure Split Test for Preventing IC Piracy by Un-Trusted Foundry and Assembly [PDF]

open access: yes, 2015
In the era of globalization, integrated circuit design and manufacturing is spread across different continents. This has posed several hardware intrinsic security issues.
Gorrepati, Hanumantha Rao
core  

Rapid mapping of digital integrated circuit logic gates via multi-spectral backside imaging [PDF]

open access: yes, 2016
Modern semiconductor integrated circuits are increasingly fabricated at untrusted third party foundries. There now exist myriad security threats of malicious tampering at the hardware level and hence a clear and pressing need for new tools that enable ...
Adato, Ronen   +6 more
core  

Hardware Trojan Detection in Open-Source Hardware Designs Using Machine Learning

open access: yesIEEE Access
The globalization of the hardware supply chain reduces costs but increases security challenges with the potential insertion of hardware trojans by third parties.
Victor Takashi Hayashi   +1 more
doaj   +1 more source

Desktop security as a three-dimensional problem [PDF]

open access: yes, 2005
In this paper we argue against viewing computer desktop security solely as a technical issue. Instead, we propose a perspective that combines three related dimensions: technical infrastructure, usability and user engagement.
Weir, G.R.S., Zonidis, N.
core  

PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans

open access: yesIEEE Access
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties.
Junjun Huan   +3 more
doaj   +1 more source

Hardware Trojans detection based on projection pursuit

open access: yesTongxin xuebao, 2013
A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension ...
Peng ZHANG, Xin-cheng WANG, Qing ZHOU
doaj   +2 more sources

A Survey of Hardware Trojan Taxonomy and Detection

open access: yesIEEE Design & Test of Computers, 2010
Editor's note:Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. This article presents a classification of hardware Trojans and a survey of published techniques for Trojan detection.
Mohammad Tehranipoor, Farinaz Koushanfar
openaire   +1 more source

A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. [PDF]

open access: yesSensors (Basel), 2023
Dong C   +6 more
europepmc   +1 more source

Hardware Trojans mitigation in MPSoCs

open access: yes, 2019
Multiprocessor System-on-Chip (MPSoC) has become necessary due to the billions of transistors available to the designer, the need for fast design turnaround times, and the power wall. Thus, present embedded systems are designed with MPSoCs, and one possible way MPSoCs can be realized is through Pipelined MPSoC (PMPSoC) architectures, which are used in ...
openaire   +3 more sources

Hardware Trojans in Chips: A Survey for Detection and Prevention. [PDF]

open access: yesSensors (Basel), 2020
Dong C   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy