Results 201 to 210 of about 32,756 (234)
Some of the next articles are maybe not open access.
A Survey of Hardware Trojan Detection, Diagnosis and Prevention
2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics), 2015Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with various means to steal the internal sensitive data or modify original functionality, which may lead to huge economic losses and great harm to society. Therefore, it is very important to perform hardware Trojan detection and diagnosis, find potential safety hazards and apply ...
He Li 0008 +3 more
openaire +1 more source
Hardware Trojan Detection Based on Signal Correlation
2018 IEEE 27th Asian Test Symposium (ATS), 2018Hardware Trojan has attracted more and more attention from academia and industry because of its significant potential threat. Long activation time is a major concern during Trojan detection process. Traditional pre-silicon verification and post-silicon testing cannot be extended to detect hardware Trojans efficiently because Trojan is usually activated
Wei Zhao +3 more
openaire +1 more source
Detecting Trojans Using Data Mining Techniques
2008A trojan horse is a program that surreptitiously performs its operation under the guise of a legitimate program. Traditional approaches using signatures to detect these programs pose little danger to new and unseen samples whose signatures are not available.
Siddiqui, Muazzam +2 more
openaire +2 more sources
Hardware Trojans: Threats, Detection, and Prevention
Proceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management, 2023Chaoen Xiao +6 more
openaire +1 more source
2017
Hardware Trojans pose a serious threat to the expected functionality, performance, and security of integrated circuits (ICs). Many of the existing techniques for detection of hardware Trojans require the use of a “golden IC.” The golden IC is a fabricated instance of the design which is required to be free of Trojans and is used as a reference to ...
openaire +1 more source
Hardware Trojans pose a serious threat to the expected functionality, performance, and security of integrated circuits (ICs). Many of the existing techniques for detection of hardware Trojans require the use of a “golden IC.” The golden IC is a fabricated instance of the design which is required to be free of Trojans and is used as a reference to ...
openaire +1 more source
Introduction to Hardware Trojan Detection Methods
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015, 2015Julien Francq, Florian Frick
openaire +2 more sources
Test Generation for Hardware Trojan Detection Using Correlation Analysis and Genetic Algorithm
Transactions on Embedded Computing Systems, 2021Yanjiang Liu, Jiaji He
exaly
Revisiting Trojan Insertion Techniques for Post-Silicon Trojan Detection Evaluation
2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2023Vedika Saravanan +2 more
openaire +1 more source
A machine learning based golden-free detection method for command-activated hardware Trojan
Information Sciences, 2020Keke Gai, Liehuang Zhu
exaly

