Results 1 to 10 of about 32,756 (234)

A Survey of Hardware Trojan Taxonomy and Detection

open access: yesIEEE Design and Test of Computers, 2010
Editor's note:Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. This article presents a classification of hardware Trojans and a survey of published techniques for Trojan detection.
Farinaz Koushanfar
exaly   +2 more sources

Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method

open access: yesIEEE Access, 2019
Due to the globalization of the design and fabrication process of integrated circuits (ICs), ICs are becoming vulnerable to hardware Trojans. Most of the existing hardware Trojan detection works assume that the testing stage is trustworthy.
Mingfu Xue   +3 more
doaj   +3 more sources

Survey on model checking based hardware Trojan detection technology

open access: yes网络与信息安全学报, 2021
Hardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit.In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed.As one of ...
Qizhi ZHANG   +3 more
doaj   +3 more sources

Research on electromagnetic radiation based side-channel analysis method for hardware Trojan detection

open access: yes网络与信息安全学报, 2021
With the globalization of the integrated circuit industry, hardware Trojan is becoming the main threat to integrated circuits. At present, the side-channel analysis which can make a good trade-off between detection ability and cost, has attracted more ...
TANG Yongkang, HU Xing, SU Ting, LI Shaoqing
doaj   +3 more sources

Data Augmented Hardware Trojan Detection Using Label Spreading Algorithm Based Transductive Learning for Edge Computing-Assisted IoT Devices

open access: yesIEEE Access, 2022
IoT devices handle a large amount of information including sensitive information pertaining to the deployed application. Such a scenario, makes IoT devices susceptible to various attacks.
Vaishnavi Sankar   +2 more
doaj   +1 more source

Detecting Unknown Hardware Trojans in Register Transfer Level Leveraging Verilog Conditional Branching Features

open access: yesIEEE Access, 2023
Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction ...
Sarwono Sutikno   +3 more
doaj   +1 more source

Implantation and Detection of a Sequential Bus Hardware Trojan [PDF]

open access: yesJisuanji gongcheng, 2021
RS bus integrated circuit has been widely used in aerospace and industrial control.With the hardware Trojan detection for integrated circuits becoming a research hotspot,as a branch of bus hardware Trojan research field,its design has been paid more and ...
HUANG Jiaoying, LI Shengyu, GAO Cheng, YANG Daming
doaj   +1 more source

A Framework for the Detection of Banking Trojans in Android

open access: yesInternational Journal of Network Security & Its Applications, 2022
Android is the most widely used operating system today and occupies more than 70% share of the smartphone market. It is also a popular target for attackers looking to exploit mobile operating systems for personal gains. More and more malware are targeting android operating system like Android Banking Trojans (ABTs) which are widely being discovered. To
Subarna Adhikari   +2 more
openaire   +2 more sources

TrojanDetector: A Multi-Layer Hybrid Approach for Trojan Detection in Android Applications

open access: yesApplied Sciences, 2022
Trojan Detection—the process of understanding the behaviour of a suspicious file has been the talk of the town these days. Existing approaches, e.g., signature-based, have not been able to classify them accurately as Trojans.
Subhan Ullah   +4 more
doaj   +1 more source

Detection of Trojans in integrated circuits

open access: yes2012 International Symposium on Innovations in Intelligent Systems and Applications, 2012
This paper presents several signal processing approaches in Trojan detection problem in very large scale integrated circuits. Specifically, wavelet transforms, spectrograms and neural networks are used to analyze power side-channel signals. Trojans in integrated circuits can try to hide themselves and become almost invisible due to process and ...
Baktır, Selçuk   +5 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy