Results 11 to 20 of about 32,756 (234)

Statistical screening for IC Trojan detection [PDF]

open access: yes2012 IEEE International Symposium on Circuits and Systems, 2012
We present statistical screening of test vectors for detecting a Trojan, malicious circuitry hidden inside an integrated circuit (IC). When applied a test vector, a Trojan-embedded chip draws extra leakage current that is unfortunately too small for the detector in most cases and concealed by process variation related to chip fabrication. To remedy the
Youngjune Gwon   +4 more
openaire   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Hardware Trojan detection method based upon XGBoost model

open access: yesDianzi Jishu Yingyong, 2019
This paper proposed a hardware Trojan detection method based upon XGBoost(eXtreme Gradient Boosting) model by using the analysis results of ring oscillator network, and used the cross-validation method to optimize the model.
Gao Hongbo   +3 more
doaj   +1 more source

Hardware Trojan Detection Based on Improved Euclidean Distance [PDF]

open access: yesJisuanji gongcheng, 2017
The accuracy of the hardware Trojan detection method based on the traditional Euclidean distance discrimination is too low to meet the demand.For this reason,the side-channel power consumption information is collected and analized in this paper,and an ...
WANG Jianxin,WANG Boren,QU Ming,ZHANG Lei
doaj   +1 more source

Observational Constraints on Trojans of Transiting Extrasolar Planets [PDF]

open access: yes, 2006
Theoretical studies predict that Trojans are likely a frequent byproduct of planet formation and evolution. We present a novel method of detecting Trojan companions to transiting extrasolar planets which involves comparing the time of central eclipse ...
Ford, Eric B., Gaudi, B. Scott
core   +3 more sources

Hardware Trojan Identification and Detection

open access: yesInternational Journal on Cryptography and Information Security, 2017
ABSTRACT The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques.
Moein, Samer   +3 more
openaire   +1 more source

An Unsupervised Detection Approach for Hardware Trojans [PDF]

open access: yesIEEE Access, 2020
With the booming development of the cyber-physical system, human society is much more dependent on information technology. Unfortunately, like software, hardware is not trusted at all, due to so many third parties involved in the separated integrated circuit's (IC) design and manufacturing stages for the high profit.
Chen Dong 0002   +5 more
openaire   +2 more sources

Creation and detection of hardware trojans using non-invasive off-the-shelf technologies [PDF]

open access: yes, 2018
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans.
Bellekens, Xavier   +2 more
core   +5 more sources

Research on hardware Trojan defense

open access: yes网络与信息安全学报, 2017
The definition and features of hardware Trojan were described firstly.After that,recent researches of defense and detection techniques were categorized with complete comparison and analysis.Then,current researches limitations were discussed based on the ...
Kan WANG   +3 more
doaj   +3 more sources

Evidence for Color Dichotomy in the Primordial Neptunian Trojan Population [PDF]

open access: yes, 2018
In the current model of early Solar System evolution, the stable members of the Jovian and Neptunian Trojan populations were captured into resonance from the leftover reservoir of planetesimals during the outward migration of the giant planets.
Abbott, T. M. C.   +47 more
core   +2 more sources

Home - About - Disclaimer - Privacy