Results 1 to 10 of about 32,550 (168)

Survey on model checking based hardware Trojan detection technology

open access: yes网络与信息安全学报, 2021
Hardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit.In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed.As one of ...
Qizhi ZHANG   +3 more
doaj   +3 more sources

Research on electromagnetic radiation based side-channel analysis method for hardware Trojan detection

open access: yes网络与信息安全学报, 2021
With the globalization of the integrated circuit industry, hardware Trojan is becoming the main threat to integrated circuits. At present, the side-channel analysis which can make a good trade-off between detection ability and cost, has attracted more ...
TANG Yongkang, HU Xing, SU Ting, LI Shaoqing
doaj   +3 more sources

Data Augmented Hardware Trojan Detection Using Label Spreading Algorithm Based Transductive Learning for Edge Computing-Assisted IoT Devices

open access: yesIEEE Access, 2022
IoT devices handle a large amount of information including sensitive information pertaining to the deployed application. Such a scenario, makes IoT devices susceptible to various attacks.
Vaishnavi Sankar   +2 more
doaj   +1 more source

Detecting Unknown Hardware Trojans in Register Transfer Level Leveraging Verilog Conditional Branching Features

open access: yesIEEE Access, 2023
Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction ...
Sarwono Sutikno   +3 more
doaj   +1 more source

DETERRENT

open access: yesProceedings of the 59th ACM/IEEE Design Automation Conference, 2022
Insertion of hardware Trojans (HTs) in integrated circuits is a pernicious threat. Since HTs are activated under rare trigger conditions, detecting them using random logic simulations is infeasible. In this work, we design a reinforcement learning (RL) agent that circumvents the exponential search space and returns a minimal set of patterns that is ...
Gohil, Vasudev   +5 more
openaire   +2 more sources

Cassandra: Detecting Trojaned Networks From Adversarial Perturbations [PDF]

open access: yesIEEE Access, 2021
Deep neural networks are being widely deployed for many critical tasks due to their high classification accuracy. In many cases, pre-trained models are sourced from vendors who may have disrupted the training pipeline to insert Trojan behaviors into the models.
Xiaoyu Zhang   +4 more
openaire   +3 more sources

Implantation and Detection of a Sequential Bus Hardware Trojan [PDF]

open access: yesJisuanji gongcheng, 2021
RS bus integrated circuit has been widely used in aerospace and industrial control.With the hardware Trojan detection for integrated circuits becoming a research hotspot,as a branch of bus hardware Trojan research field,its design has been paid more and ...
HUANG Jiaoying, LI Shengyu, GAO Cheng, YANG Daming
doaj   +1 more source

Smart Hardware Trojan Detection System

open access: yes, 2022
The IoT has become an indispensable part of human lives at work and home applications. Due to the need for an enormous number of IoT devices manufacturers are least concerned about security vulnerabilities during designing and developing of these devices.
Alkhazendar, Iyad   +2 more
openaire   +4 more sources

TrojanDetector: A Multi-Layer Hybrid Approach for Trojan Detection in Android Applications

open access: yesApplied Sciences, 2022
Trojan Detection—the process of understanding the behaviour of a suspicious file has been the talk of the town these days. Existing approaches, e.g., signature-based, have not been able to classify them accurately as Trojans.
Subhan Ullah   +4 more
doaj   +1 more source

Design and detection of hardware Trojan based on satisfiability don't cares

open access: yes网络与信息安全学报, 2021
Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.
WU Lingjuan   +1 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy