Results 191 to 200 of about 32,602 (220)
Some of the next articles are maybe not open access.
Ring Oscillators and Hardware Trojan Detection
2017Hardware Trojan horses is a realistic threat in the modern IC supply chain. Once the associate risk is considered, appropriate defense mechanisms must be designed and employed at the various stages in order to detect such hardware malware. We propose two novel uses of ring oscillators, one as an attack vector against hardware implementations of true ...
Paris Kitsos +2 more
openaire +1 more source
Template-Based Trojan Detection .
Proposed for presentation at the Student Symposium held July 25-28, 2022 in Albuquerque, NM United States, 2022openaire +1 more source
Revisiting Trojan Insertion Techniques for Post-Silicon Trojan Detection Evaluation
2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2023Vedika Saravanan +2 more
openaire +1 more source
AI Hardware Oriented Trojan Detection Architecture
The 2022 5th International Conference on Electronics, Communications and Control Engineering, 2022Shu Takemoto +3 more
openaire +1 more source
Signal processing for hardware trojan detection
2020Today, with increasing technological advances, trustworthiness has also been a major problem. Taking the production of IC as a global parameter is one of the strategies for reducing the chip cost. Advantages in manufacturing cost and an access to advanced fabrication facilities enforce manufacturer to outsource IC fabrication so that costs are reduced.
openaire +1 more source

