Results 201 to 210 of about 32,756 (234)
Some of the next articles are maybe not open access.

A Survey of Hardware Trojan Detection, Diagnosis and Prevention

2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics), 2015
Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with various means to steal the internal sensitive data or modify original functionality, which may lead to huge economic losses and great harm to society. Therefore, it is very important to perform hardware Trojan detection and diagnosis, find potential safety hazards and apply ...
He Li 0008   +3 more
openaire   +1 more source

Hardware Trojan Detection Based on Signal Correlation

2018 IEEE 27th Asian Test Symposium (ATS), 2018
Hardware Trojan has attracted more and more attention from academia and industry because of its significant potential threat. Long activation time is a major concern during Trojan detection process. Traditional pre-silicon verification and post-silicon testing cannot be extended to detect hardware Trojans efficiently because Trojan is usually activated
Wei Zhao   +3 more
openaire   +1 more source

Detecting Trojans Using Data Mining Techniques

2008
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitimate program. Traditional approaches using signatures to detect these programs pose little danger to new and unseen samples whose signatures are not available.
Siddiqui, Muazzam   +2 more
openaire   +2 more sources

Hardware Trojan Detection

2023
Mark Tehranipoor   +2 more
openaire   +1 more source

Hardware Trojans: Threats, Detection, and Prevention

Proceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management, 2023
Chaoen Xiao   +6 more
openaire   +1 more source

Golden-Free Trojan Detection

2017
Hardware Trojans pose a serious threat to the expected functionality, performance, and security of integrated circuits (ICs). Many of the existing techniques for detection of hardware Trojans require the use of a “golden IC.” The golden IC is a fabricated instance of the design which is required to be free of Trojans and is used as a reference to ...
openaire   +1 more source

Introduction to Hardware Trojan Detection Methods

Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015, 2015
Julien Francq, Florian Frick
openaire   +2 more sources

Test Generation for Hardware Trojan Detection Using Correlation Analysis and Genetic Algorithm

Transactions on Embedded Computing Systems, 2021
Yanjiang Liu, Jiaji He
exaly  

Revisiting Trojan Insertion Techniques for Post-Silicon Trojan Detection Evaluation

2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2023
Vedika Saravanan   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy