Results 181 to 190 of about 32,602 (220)
Some of the next articles are maybe not open access.

Golden-Free Trojan Detection

2017
Hardware Trojans pose a serious threat to the expected functionality, performance, and security of integrated circuits (ICs). Many of the existing techniques for detection of hardware Trojans require the use of a “golden IC.” The golden IC is a fabricated instance of the design which is required to be free of Trojans and is used as a reference to ...
openaire   +1 more source

Hard to Detect Combinational Hardware Trojans

2018 8th International Symposium on Embedded Computing and System Design (ISED), 2018
Hardware Trojan (HT), caused by outsiders, modifies fabrication of a golden IC and avoids normal testing. The alteration by an HT targets disabling the main function of the IC or degrades signal integrity. Most vulnerable HTs are even designed to break hardware security.
Nilanjana Das   +2 more
openaire   +1 more source

Towards a Hardware Trojan Detection Cycle

2014 Ninth International Conference on Availability, Reliability and Security, 2014
Intentionally inserted malfunctions in integrated circuits, referred to as Hardware Trojans, have become an emerging threat. Recently, the scientific community started to propose technical approaches to mitigate the threat of unspecified and potentially malicious functionality.
Adrian Dabrowski   +4 more
openaire   +1 more source

Detecting Trojans Using Data Mining Techniques

2008
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitimate program. Traditional approaches using signatures to detect these programs pose little danger to new and unseen samples whose signatures are not available.
Siddiqui, Muazzam   +2 more
openaire   +2 more sources

Nonlinear analysis for hardware Trojan detection

2015 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), 2015
As an important content of chip security, Hardware Trojan detection has attracted a lot of attention. The existing Hardware Trojan detection methods based on side-channel power consumption are effective. The main existing Hardware Trojan detection methods based on side-channel power consumption analysis mainly concentrate on linear features but ignore ...
Errui Zhou   +3 more
openaire   +1 more source

Logic Testing for Hardware Trojan Detection

2017
In this chapter, we describe effective logic testing algorithms for relatively small (less than ten two-input NAND gate equivalent) hardware Trojan detection. Conventional post-manufacturing testing, test generation algorithms, and test coverage metrics cannot be readily extended to hardware Trojan detection. To reduce this lacuna, a novel test pattern
Vidya Govindan, Rajat Subhra Chakraborty
openaire   +1 more source

Potential Trigger Detection for Hardware Trojans

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018
Due to the globalization trend of IC industry, more and more chips are designed and/or fabricated by foreign companies and foundries. Among all the consequences of this globalization trend, the possible existence of stealthy-inserted hardware Trojans (HTs) has raised a great security concern.
Minhui Zou   +3 more
openaire   +1 more source

Self-Reference-Based Hardware Trojan Detection

IEEE Transactions on Semiconductor Manufacturing, 2018
Outsourcing of the chip product chain makes hardware vulnerable to be attacked. For example, an attacker who has access to hardware fabrication process can alter the genuine hardware with the insertion of concealed hardware elements [hardware Trojan (HT)]. Therefore, microelectronic circuit HT detection becomes a key step of chip production.
Hao Xue, Saiyu Ren
openaire   +1 more source

Hardware Trojan detection methodology for FPGA

2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), 2013
Nowadays, hardware Trojan protection became a hot topic especially after the horizontal silicon industry business model. Third party IPs are the building blocks of many critical systems and that arises the question of confidentiality and reliability of these blocks.
Amr Al-Anwar   +3 more
openaire   +1 more source

Hardware Trojan Detection using Xilinx Vivado

NAECON 2018 - IEEE National Aerospace and Electronics Conference, 2018
Modern commercial EDA tools provide end users with a framework for application specific customizations through a general-purpose programming language interface to an underlying circuit object model. Xilinx Vivado exposes that information through Tcl.
Ryan Marlow   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy