Results 191 to 200 of about 32,602 (220)
Some of the next articles are maybe not open access.

Hardware Trojan Detection

2023
Mark Tehranipoor   +2 more
openaire   +1 more source

CAD for Hardware Trojan Detection

2023
Farimah Farahmandi   +3 more
openaire   +1 more source

Ring Oscillators and Hardware Trojan Detection

2017
Hardware Trojan horses is a realistic threat in the modern IC supply chain. Once the associate risk is considered, appropriate defense mechanisms must be designed and employed at the various stages in order to detect such hardware malware. We propose two novel uses of ring oscillators, one as an attack vector against hardware implementations of true ...
Paris Kitsos   +2 more
openaire   +1 more source

Template-Based Trojan Detection .

Proposed for presentation at the Student Symposium held July 25-28, 2022 in Albuquerque, NM United States, 2022
openaire   +1 more source

Revisiting Trojan Insertion Techniques for Post-Silicon Trojan Detection Evaluation

2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2023
Vedika Saravanan   +2 more
openaire   +1 more source

AI Hardware Oriented Trojan Detection Architecture

The 2022 5th International Conference on Electronics, Communications and Control Engineering, 2022
Shu Takemoto   +3 more
openaire   +1 more source

Signal processing for hardware trojan detection

2020
Today, with increasing technological advances, trustworthiness has also been a major problem. Taking the production of IC as a global parameter is one of the strategies for reducing the chip cost. Advantages in manufacturing cost and an access to advanced fabrication facilities enforce manufacturer to outsource IC fabrication so that costs are reduced.
openaire   +1 more source

Home - About - Disclaimer - Privacy