Results 191 to 200 of about 32,756 (234)
Some of the next articles are maybe not open access.
A survey on hardware trojan detection techniques
2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2015Hardware Trojans recently emerged as a serious issue for computer systems, especially for those used in critical applications such as medical or military. Trojan proposed so far can affect the reliability of a device in various ways. Proposed effects range from the leakage of secret information to the complete malfunctioning of the device.
Shivam Bhasin, Francesco Regazzoni 0001
openaire +1 more source
Hardware trojan design and detection
Proceedings of the Workshop on Embedded Systems Security, 2013Hardware Trojan design and detection have been extensively studied during the last years. In this work we investigate non-invasive detection methods utilizing so-called side-channel analysis. In the past, almost all proposed detection techniques have been evaluated based on simulations only and thus, the question remains how well they perform in ...
Sebastian Kutzner +2 more
openaire +1 more source
2011
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire +1 more source
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire +1 more source
Towards a Hardware Trojan Detection Cycle
2014 Ninth International Conference on Availability, Reliability and Security, 2014Intentionally inserted malfunctions in integrated circuits, referred to as Hardware Trojans, have become an emerging threat. Recently, the scientific community started to propose technical approaches to mitigate the threat of unspecified and potentially malicious functionality.
Adrian Dabrowski +4 more
openaire +1 more source
Survey: Hardware Trojan Detection for Netlist
2020 IEEE 29th Asian Test Symposium (ATS), 2020The development of integrated circuit technology is accompanied by potential threats. Malicious modifications to circuits, known as hardware Trojans, are major security concerns. This paper gives a survey of hardware Trojan detection methods towards gate-level netlists.
Yipei Yang +6 more
openaire +1 more source
Trojan Detection using IC Fingerprinting
2007 IEEE Symposium on Security and Privacy (SP '07), 2007Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to their much lower cost structure. This poses a significant security risk for ICs used for critical military and business applications. Attackers can exploit this loss of control to substitute Trojan ICs for genuine ones or insert a Trojan circuit into the ...
Dakshi Agrawal +4 more
openaire +1 more source
Detection of a Trailing (L5) Neptune Trojan
Science, 2010An asteroid follows the orbit of the planet Neptune in a region of gravitational stability.
Scott S, Sheppard, Chadwick A, Trujillo
openaire +2 more sources
Towards a hardware Trojan detection methodology
2014 3rd Mediterranean Conference on Embedded Computing (MECO), 2014Malicious hardware is a realistic threat. It can be possible to insert the malicious functionality on a device as deep as in the hardware design flow, long before manufacturing the silicon product. Towards developing a hardware Trojan horse detection methodology, we analyze capabilities and limitations of existing techniques, framing a testing strategy
Paris Kitsos, Artemios G. Voyiatzis
openaire +1 more source
Potential Trigger Detection for Hardware Trojans
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018Due to the globalization trend of IC industry, more and more chips are designed and/or fabricated by foreign companies and foundries. Among all the consequences of this globalization trend, the possible existence of stealthy-inserted hardware Trojans (HTs) has raised a great security concern.
Minhui Zou +3 more
openaire +1 more source
Test Pattern Superposition to Detect Hardware Trojans
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2020Current methods for the detection of hardware Trojans inserted by an untrusted foundry are either accompanied by unreasonable costs in design/test pattern overhead, or return results that fail to provide confident trustability. The challenges faced by these side-channel techniques are primarily a result of process variation, which renders pre-silicon ...
Chris Nigh, Alex Orailoglu
openaire +1 more source

