Results 181 to 190 of about 32,756 (234)
Microbial Siderophores: A New Insight on Healthcare Applications. [PDF]
Mayegowda SB, Gadilingappa MN.
europepmc +1 more source
A library of lineage-specific driver lines connects developing neuronal circuits to behavior in the <i>Drosophila</i> ventral nerve cord. [PDF]
Soffers JHM +11 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
On Reliability Trojan Injection and Detection
Journal of Low Power Electronics, 2012Hardware design houses are increasingly outsourcing designs to be manufactured by cheaper fabrication facilities due to economic factors and market forces. This raises the question of trustable manufactured products for highly sensitive applications. One such type of trust issue is the possible incorporation of Trojan circuits into the IC with the goal
Aswin Sreedhar +2 more
openaire +1 more source
Character Reassignment for Hardware Trojan Detection
2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), 2021With the current business model and increasing complexity of hardware designs, third-party Intellectual Properties (IPs) are prevalently incorporated into first-party designs. The use of third-party IPs increases security concerns related to hardware Trojans inserted by attackers.
Noah Waller +4 more
openaire +1 more source
Improving hardware Trojan detection by retiming
Microprocessors and Microsystems, 2015Abstract Hardware Trojan horses (HTHs) are challenging threats to the security of silicon chips. A promising solution is path-delay fingerprinting for HTH detection. This paper presents trust-driven retiming ( TDR ) , a synthesis approach to provide a circuit which can be analyzed more effectively by delay fingerprinting.
Seyed Mohammad Hossein Shekarian +1 more
openaire +1 more source
A signature based architecture for Trojan detection
Proceedings of the 9th Workshop on Embedded Systems Security, 2014Trust in the integrated circuit (IC) fabrication industry is an ongoing concern given the trend towards "fabless" design and associated use of third-parties for fabrication. A Hardware Trojan (HT) introduced during fabrication can corrupt an IC's outputs, leak secret information, and yet go undetected by traditional system testing techniques.
Aderinola Gbade-Alabi +5 more
openaire +1 more source
Hard to Detect Combinational Hardware Trojans
2018 8th International Symposium on Embedded Computing and System Design (ISED), 2018Hardware Trojan (HT), caused by outsiders, modifies fabrication of a golden IC and avoids normal testing. The alteration by an HT targets disabling the main function of the IC or degrades signal integrity. Most vulnerable HTs are even designed to break hardware security.
Nilanjana Das +2 more
openaire +1 more source

