Results 181 to 190 of about 32,602 (220)
Some of the next articles are maybe not open access.
2017
Hardware Trojans pose a serious threat to the expected functionality, performance, and security of integrated circuits (ICs). Many of the existing techniques for detection of hardware Trojans require the use of a “golden IC.” The golden IC is a fabricated instance of the design which is required to be free of Trojans and is used as a reference to ...
openaire +1 more source
Hardware Trojans pose a serious threat to the expected functionality, performance, and security of integrated circuits (ICs). Many of the existing techniques for detection of hardware Trojans require the use of a “golden IC.” The golden IC is a fabricated instance of the design which is required to be free of Trojans and is used as a reference to ...
openaire +1 more source
Hard to Detect Combinational Hardware Trojans
2018 8th International Symposium on Embedded Computing and System Design (ISED), 2018Hardware Trojan (HT), caused by outsiders, modifies fabrication of a golden IC and avoids normal testing. The alteration by an HT targets disabling the main function of the IC or degrades signal integrity. Most vulnerable HTs are even designed to break hardware security.
Nilanjana Das +2 more
openaire +1 more source
Towards a Hardware Trojan Detection Cycle
2014 Ninth International Conference on Availability, Reliability and Security, 2014Intentionally inserted malfunctions in integrated circuits, referred to as Hardware Trojans, have become an emerging threat. Recently, the scientific community started to propose technical approaches to mitigate the threat of unspecified and potentially malicious functionality.
Adrian Dabrowski +4 more
openaire +1 more source
Detecting Trojans Using Data Mining Techniques
2008A trojan horse is a program that surreptitiously performs its operation under the guise of a legitimate program. Traditional approaches using signatures to detect these programs pose little danger to new and unseen samples whose signatures are not available.
Siddiqui, Muazzam +2 more
openaire +2 more sources
Nonlinear analysis for hardware Trojan detection
2015 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), 2015As an important content of chip security, Hardware Trojan detection has attracted a lot of attention. The existing Hardware Trojan detection methods based on side-channel power consumption are effective. The main existing Hardware Trojan detection methods based on side-channel power consumption analysis mainly concentrate on linear features but ignore ...
Errui Zhou +3 more
openaire +1 more source
Logic Testing for Hardware Trojan Detection
2017In this chapter, we describe effective logic testing algorithms for relatively small (less than ten two-input NAND gate equivalent) hardware Trojan detection. Conventional post-manufacturing testing, test generation algorithms, and test coverage metrics cannot be readily extended to hardware Trojan detection. To reduce this lacuna, a novel test pattern
Vidya Govindan, Rajat Subhra Chakraborty
openaire +1 more source
Potential Trigger Detection for Hardware Trojans
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018Due to the globalization trend of IC industry, more and more chips are designed and/or fabricated by foreign companies and foundries. Among all the consequences of this globalization trend, the possible existence of stealthy-inserted hardware Trojans (HTs) has raised a great security concern.
Minhui Zou +3 more
openaire +1 more source
Self-Reference-Based Hardware Trojan Detection
IEEE Transactions on Semiconductor Manufacturing, 2018Outsourcing of the chip product chain makes hardware vulnerable to be attacked. For example, an attacker who has access to hardware fabrication process can alter the genuine hardware with the insertion of concealed hardware elements [hardware Trojan (HT)]. Therefore, microelectronic circuit HT detection becomes a key step of chip production.
Hao Xue, Saiyu Ren
openaire +1 more source
Hardware Trojan detection methodology for FPGA
2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), 2013Nowadays, hardware Trojan protection became a hot topic especially after the horizontal silicon industry business model. Third party IPs are the building blocks of many critical systems and that arises the question of confidentiality and reliability of these blocks.
Amr Al-Anwar +3 more
openaire +1 more source
Hardware Trojan Detection using Xilinx Vivado
NAECON 2018 - IEEE National Aerospace and Electronics Conference, 2018Modern commercial EDA tools provide end users with a framework for application specific customizations through a general-purpose programming language interface to an underlying circuit object model. Xilinx Vivado exposes that information through Tcl.
Ryan Marlow +3 more
openaire +1 more source

