Results 191 to 200 of about 32,756 (234)
Some of the next articles are maybe not open access.

A survey on hardware trojan detection techniques

2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2015
Hardware Trojans recently emerged as a serious issue for computer systems, especially for those used in critical applications such as medical or military. Trojan proposed so far can affect the reliability of a device in various ways. Proposed effects range from the leakage of secret information to the complete malfunctioning of the device.
Shivam Bhasin, Francesco Regazzoni 0001
openaire   +1 more source

Hardware trojan design and detection

Proceedings of the Workshop on Embedded Systems Security, 2013
Hardware Trojan design and detection have been extensively studied during the last years. In this work we investigate non-invasive detection methods utilizing so-called side-channel analysis. In the past, almost all proposed detection techniques have been evaluated based on simulations only and thus, the question remains how well they perform in ...
Sebastian Kutzner   +2 more
openaire   +1 more source

Hardware Trojan Detection

2011
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle.
Seetharam Narasimhan, Swarup Bhunia
openaire   +1 more source

Towards a Hardware Trojan Detection Cycle

2014 Ninth International Conference on Availability, Reliability and Security, 2014
Intentionally inserted malfunctions in integrated circuits, referred to as Hardware Trojans, have become an emerging threat. Recently, the scientific community started to propose technical approaches to mitigate the threat of unspecified and potentially malicious functionality.
Adrian Dabrowski   +4 more
openaire   +1 more source

Survey: Hardware Trojan Detection for Netlist

2020 IEEE 29th Asian Test Symposium (ATS), 2020
The development of integrated circuit technology is accompanied by potential threats. Malicious modifications to circuits, known as hardware Trojans, are major security concerns. This paper gives a survey of hardware Trojan detection methods towards gate-level netlists.
Yipei Yang   +6 more
openaire   +1 more source

Trojan Detection using IC Fingerprinting

2007 IEEE Symposium on Security and Privacy (SP '07), 2007
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to their much lower cost structure. This poses a significant security risk for ICs used for critical military and business applications. Attackers can exploit this loss of control to substitute Trojan ICs for genuine ones or insert a Trojan circuit into the ...
Dakshi Agrawal   +4 more
openaire   +1 more source

Detection of a Trailing (L5) Neptune Trojan

Science, 2010
An asteroid follows the orbit of the planet Neptune in a region of gravitational stability.
Scott S, Sheppard, Chadwick A, Trujillo
openaire   +2 more sources

Towards a hardware Trojan detection methodology

2014 3rd Mediterranean Conference on Embedded Computing (MECO), 2014
Malicious hardware is a realistic threat. It can be possible to insert the malicious functionality on a device as deep as in the hardware design flow, long before manufacturing the silicon product. Towards developing a hardware Trojan horse detection methodology, we analyze capabilities and limitations of existing techniques, framing a testing strategy
Paris Kitsos, Artemios G. Voyiatzis
openaire   +1 more source

Potential Trigger Detection for Hardware Trojans

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018
Due to the globalization trend of IC industry, more and more chips are designed and/or fabricated by foreign companies and foundries. Among all the consequences of this globalization trend, the possible existence of stealthy-inserted hardware Trojans (HTs) has raised a great security concern.
Minhui Zou   +3 more
openaire   +1 more source

Test Pattern Superposition to Detect Hardware Trojans

2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2020
Current methods for the detection of hardware Trojans inserted by an untrusted foundry are either accompanied by unreasonable costs in design/test pattern overhead, or return results that fail to provide confident trustability. The challenges faced by these side-channel techniques are primarily a result of process variation, which renders pre-silicon ...
Chris Nigh, Alex Orailoglu
openaire   +1 more source

Home - About - Disclaimer - Privacy