Results 181 to 190 of about 32,756 (234)

A library of lineage-specific driver lines connects developing neuronal circuits to behavior in the <i>Drosophila</i> ventral nerve cord. [PDF]

open access: yesElife
Soffers JHM   +11 more
europepmc   +1 more source

Deltaviruses spread through a viral Trojan Horse

open access: yes
McKellar J   +14 more
europepmc   +1 more source

On Reliability Trojan Injection and Detection

Journal of Low Power Electronics, 2012
Hardware design houses are increasingly outsourcing designs to be manufactured by cheaper fabrication facilities due to economic factors and market forces. This raises the question of trustable manufactured products for highly sensitive applications. One such type of trust issue is the possible incorporation of Trojan circuits into the IC with the goal
Aswin Sreedhar   +2 more
openaire   +1 more source

Character Reassignment for Hardware Trojan Detection

2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), 2021
With the current business model and increasing complexity of hardware designs, third-party Intellectual Properties (IPs) are prevalently incorporated into first-party designs. The use of third-party IPs increases security concerns related to hardware Trojans inserted by attackers.
Noah Waller   +4 more
openaire   +1 more source

Improving hardware Trojan detection by retiming

Microprocessors and Microsystems, 2015
Abstract Hardware Trojan horses (HTHs) are challenging threats to the security of silicon chips. A promising solution is path-delay fingerprinting for HTH detection. This paper presents trust-driven retiming ( TDR ) , a synthesis approach to provide a circuit which can be analyzed more effectively by delay fingerprinting.
Seyed Mohammad Hossein Shekarian   +1 more
openaire   +1 more source

A signature based architecture for Trojan detection

Proceedings of the 9th Workshop on Embedded Systems Security, 2014
Trust in the integrated circuit (IC) fabrication industry is an ongoing concern given the trend towards "fabless" design and associated use of third-parties for fabrication. A Hardware Trojan (HT) introduced during fabrication can corrupt an IC's outputs, leak secret information, and yet go undetected by traditional system testing techniques.
Aderinola Gbade-Alabi   +5 more
openaire   +1 more source

Hard to Detect Combinational Hardware Trojans

2018 8th International Symposium on Embedded Computing and System Design (ISED), 2018
Hardware Trojan (HT), caused by outsiders, modifies fabrication of a golden IC and avoids normal testing. The alteration by an HT targets disabling the main function of the IC or degrades signal integrity. Most vulnerable HTs are even designed to break hardware security.
Nilanjana Das   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy