Results 171 to 180 of about 32,602 (220)
Some of the next articles are maybe not open access.
Hardware Trojan Detection using Ring Oscillator
2021 6th International Conference on Communication and Electronics Systems (ICCES), 2021Hardware Trojans are malicious modules causing vulnerabilities in designs. Secured hardware designs are desirable in almost all applications. So, it is important to make a trustworthy design that actually exposes malfunctions when a Trojan is present in it.
Deepthi S, Ramesh S. R, Nirmala Devi M
openaire +1 more source
Genetic Algorithm based Hardware Trojan Detection
2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), 2021There is an increasing concern about possible hostile modification done to ICs, which are used in various critical applications. Such malicious modifications are referred to as Hardware Trojan. A novel procedure to detect these malicious Trojans using Genetic algorithm along with the logical masking technique which masks the Trojan module when embedded
Ch Sai Sruthi +5 more
openaire +1 more source
Trojan Detection using IC Fingerprinting
2007 IEEE Symposium on Security and Privacy (SP '07), 2007Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to their much lower cost structure. This poses a significant security risk for ICs used for critical military and business applications. Attackers can exploit this loss of control to substitute Trojan ICs for genuine ones or insert a Trojan circuit into the ...
Dakshi Agrawal +4 more
openaire +1 more source
Hardware trojan design and detection
Proceedings of the Workshop on Embedded Systems Security, 2013Hardware Trojan design and detection have been extensively studied during the last years. In this work we investigate non-invasive detection methods utilizing so-called side-channel analysis. In the past, almost all proposed detection techniques have been evaluated based on simulations only and thus, the question remains how well they perform in ...
Sebastian Kutzner +2 more
openaire +1 more source
Golden Chip-Free Trojan Detection Leveraging Trojan Trigger’s Side-Channel Fingerprinting
ACM Transactions on Embedded Computing Systems, 2020Hardware Trojans (HTs) have become a major threat for the integrated circuit industry and supply chain and have motivated numerous developments of HT detection schemes. Although the side-channel HT detection approach is among the most promising solutions, most of the previous methods require a trusted golden chip reference.
Jiaji He +3 more
openaire +1 more source
2011
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire +1 more source
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire +1 more source
Detection of a Trailing (L5) Neptune Trojan
Science, 2010An asteroid follows the orbit of the planet Neptune in a region of gravitational stability.
Scott S, Sheppard, Chadwick A, Trujillo
openaire +2 more sources
Trojan Detection Using Machine Learning
2019Machine learning techniques have the capability to explore high-dimensional feature space and find patterns that are not intuitive for analytic approaches. It is natural to apply these techniques for hardware Trojan detection to distinguish Trojan-infected designs from good designs.
Farimah Farahmandi +2 more
openaire +1 more source
Hardware Trojan Detection Based on SRC
2020 35th Youth Academic Annual Conference of Chinese Association of Automation (YAC), 2020The security of integrated circuits (IC) plays a very significant role on military, economy, communication and other industries. Due to the globalization of the integrated circuit (IC) from design to manufacturing process, the IC chip is vulnerable to be implanted malicious circuit, which is known as hardware Trojan (HT).
Chen Sun +3 more
openaire +1 more source
Towards a hardware Trojan detection methodology
2014 3rd Mediterranean Conference on Embedded Computing (MECO), 2014Malicious hardware is a realistic threat. It can be possible to insert the malicious functionality on a device as deep as in the hardware design flow, long before manufacturing the silicon product. Towards developing a hardware Trojan horse detection methodology, we analyze capabilities and limitations of existing techniques, framing a testing strategy
Paris Kitsos, Artemios G. Voyiatzis
openaire +1 more source

