Results 11 to 20 of about 32,756 (234)
Statistical screening for IC Trojan detection [PDF]
We present statistical screening of test vectors for detecting a Trojan, malicious circuitry hidden inside an integrated circuit (IC). When applied a test vector, a Trojan-embedded chip draws extra leakage current that is unfortunately too small for the detector in most cases and concealed by process variation related to chip fabrication. To remedy the
Youngjune Gwon +4 more
openaire +1 more source
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Hardware Trojan detection method based upon XGBoost model
This paper proposed a hardware Trojan detection method based upon XGBoost(eXtreme Gradient Boosting) model by using the analysis results of ring oscillator network, and used the cross-validation method to optimize the model.
Gao Hongbo +3 more
doaj +1 more source
Hardware Trojan Detection Based on Improved Euclidean Distance [PDF]
The accuracy of the hardware Trojan detection method based on the traditional Euclidean distance discrimination is too low to meet the demand.For this reason,the side-channel power consumption information is collected and analized in this paper,and an ...
WANG Jianxin,WANG Boren,QU Ming,ZHANG Lei
doaj +1 more source
Observational Constraints on Trojans of Transiting Extrasolar Planets [PDF]
Theoretical studies predict that Trojans are likely a frequent byproduct of planet formation and evolution. We present a novel method of detecting Trojan companions to transiting extrasolar planets which involves comparing the time of central eclipse ...
Ford, Eric B., Gaudi, B. Scott
core +3 more sources
Hardware Trojan Identification and Detection
ABSTRACT The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques.
Moein, Samer +3 more
openaire +1 more source
An Unsupervised Detection Approach for Hardware Trojans [PDF]
With the booming development of the cyber-physical system, human society is much more dependent on information technology. Unfortunately, like software, hardware is not trusted at all, due to so many third parties involved in the separated integrated circuit's (IC) design and manufacturing stages for the high profit.
Chen Dong 0002 +5 more
openaire +2 more sources
Creation and detection of hardware trojans using non-invasive off-the-shelf technologies [PDF]
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans.
Bellekens, Xavier +2 more
core +5 more sources
Research on hardware Trojan defense
The definition and features of hardware Trojan were described firstly.After that,recent researches of defense and detection techniques were categorized with complete comparison and analysis.Then,current researches limitations were discussed based on the ...
Kan WANG +3 more
doaj +3 more sources
Evidence for Color Dichotomy in the Primordial Neptunian Trojan Population [PDF]
In the current model of early Solar System evolution, the stable members of the Jovian and Neptunian Trojan populations were captured into resonance from the leftover reservoir of planetesimals during the outward migration of the giant planets.
Abbott, T. M. C. +47 more
core +2 more sources

