Results 1 to 10 of about 32,756 (234)
A Survey of Hardware Trojan Taxonomy and Detection
Editor's note:Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. This article presents a classification of hardware Trojans and a survey of published techniques for Trojan detection.
Farinaz Koushanfar
exaly +2 more sources
Due to the globalization of the design and fabrication process of integrated circuits (ICs), ICs are becoming vulnerable to hardware Trojans. Most of the existing hardware Trojan detection works assume that the testing stage is trustworthy.
Mingfu Xue +3 more
doaj +3 more sources
Survey on model checking based hardware Trojan detection technology
Hardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit.In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed.As one of ...
Qizhi ZHANG +3 more
doaj +3 more sources
With the globalization of the integrated circuit industry, hardware Trojan is becoming the main threat to integrated circuits. At present, the side-channel analysis which can make a good trade-off between detection ability and cost, has attracted more ...
TANG Yongkang, HU Xing, SU Ting, LI Shaoqing
doaj +3 more sources
IoT devices handle a large amount of information including sensitive information pertaining to the deployed application. Such a scenario, makes IoT devices susceptible to various attacks.
Vaishnavi Sankar +2 more
doaj +1 more source
Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction ...
Sarwono Sutikno +3 more
doaj +1 more source
Implantation and Detection of a Sequential Bus Hardware Trojan [PDF]
RS bus integrated circuit has been widely used in aerospace and industrial control.With the hardware Trojan detection for integrated circuits becoming a research hotspot,as a branch of bus hardware Trojan research field,its design has been paid more and ...
HUANG Jiaoying, LI Shengyu, GAO Cheng, YANG Daming
doaj +1 more source
A Framework for the Detection of Banking Trojans in Android
Android is the most widely used operating system today and occupies more than 70% share of the smartphone market. It is also a popular target for attackers looking to exploit mobile operating systems for personal gains. More and more malware are targeting android operating system like Android Banking Trojans (ABTs) which are widely being discovered. To
Subarna Adhikari +2 more
openaire +2 more sources
TrojanDetector: A Multi-Layer Hybrid Approach for Trojan Detection in Android Applications
Trojan Detection—the process of understanding the behaviour of a suspicious file has been the talk of the town these days. Existing approaches, e.g., signature-based, have not been able to classify them accurately as Trojans.
Subhan Ullah +4 more
doaj +1 more source
Detection of Trojans in integrated circuits
This paper presents several signal processing approaches in Trojan detection problem in very large scale integrated circuits. Specifically, wavelet transforms, spectrograms and neural networks are used to analyze power side-channel signals. Trojans in integrated circuits can try to hide themselves and become almost invisible due to process and ...
Baktır, Selçuk +5 more
openaire +3 more sources

