Results 81 to 90 of about 8,384 (195)
Secure Split Test for Preventing IC Piracy by Un-Trusted Foundry and Assembly [PDF]
In the era of globalization, integrated circuit design and manufacturing is spread across different continents. This has posed several hardware intrinsic security issues.
Gorrepati, Hanumantha Rao
core
Rapid mapping of digital integrated circuit logic gates via multi-spectral backside imaging [PDF]
Modern semiconductor integrated circuits are increasingly fabricated at untrusted third party foundries. There now exist myriad security threats of malicious tampering at the hardware level and hence a clear and pressing need for new tools that enable ...
Adato, Ronen +6 more
core
Hardware Trojan Detection in Open-Source Hardware Designs Using Machine Learning
The globalization of the hardware supply chain reduces costs but increases security challenges with the potential insertion of hardware trojans by third parties.
Victor Takashi Hayashi +1 more
doaj +1 more source
Desktop security as a three-dimensional problem [PDF]
In this paper we argue against viewing computer desktop security solely as a technical issue. Instead, we propose a perspective that combines three related dimensions: technical infrastructure, usability and user engagement.
Weir, G.R.S., Zonidis, N.
core
PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties.
Junjun Huan +3 more
doaj +1 more source
Hardware Trojans detection based on projection pursuit
A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension ...
Peng ZHANG, Xin-cheng WANG, Qing ZHOU
doaj +2 more sources
A Survey of Hardware Trojan Taxonomy and Detection
Editor's note:Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. This article presents a classification of hardware Trojans and a survey of published techniques for Trojan detection.
Mohammad Tehranipoor, Farinaz Koushanfar
openaire +1 more source
A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. [PDF]
Dong C +6 more
europepmc +1 more source
Hardware Trojans mitigation in MPSoCs
Multiprocessor System-on-Chip (MPSoC) has become necessary due to the billions of transistors available to the designer, the need for fast design turnaround times, and the power wall. Thus, present embedded systems are designed with MPSoCs, and one possible way MPSoCs can be realized is through Pipelined MPSoC (PMPSoC) architectures, which are used in ...
openaire +3 more sources
Hardware Trojans in Chips: A Survey for Detection and Prevention. [PDF]
Dong C +5 more
europepmc +1 more source

