Results 21 to 30 of about 32,756 (234)
Research on Influencing Factor of Hardware Trojan Side-channel Detection Method [PDF]
The side-channel detection method screens the hardware Trojan circuit by collecting physical parameters such as power consumption,delay,and electromagnetic field,but its detection performance is seriously affected by process fluctuation,and process ...
LI Ying,CHEN Lan,ZHOU Yinhao
doaj +1 more source
Topological Detection of Trojaned Neural Networks
Deep neural networks are known to have security issues. One particular threat is the Trojan attack. It occurs when the attackers stealthily manipulate the model's behavior through Trojaned training samples, which can later be exploited. Guided by basic neuroscientific principles we discover subtle -- yet critical -- structural deviation characterizing ...
Songzhu Zheng +4 more
openaire +3 more sources
Design and detection of hardware Trojan based on satisfiability don't cares
Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.
WU Lingjuan +1 more
doaj +1 more source
Thermal Scans for Detecting Hardware Trojans [PDF]
It is well known that companies have been outsourcing their IC production to countries where it is simply not possible to guarantee the integrity of final products. This relocation trend creates a need for methodologies and embedded design solutions to identify counterfeits but also to detect potential Hardware Trojans (HT).
Cozzi, Maxime +2 more
openaire +2 more sources
Hardware trojan detection based on the optimized SVM algorithm
The main research direction of hardware trojan detection is based on the side channel analysis. This paper proposes an optimized support vector machine(SVM) classification method to improve the accuracy and speed when analyzing the data for detection ...
Zhang Lei +3 more
doaj +1 more source
A machine learning method for hardware Trojan detection on real chips
Due to the global supply chain of integrated circuits (IC) from design to application, Hardware Trojan (HT) may be stealthily inserted into ICs. The effect of HT detection methods are related to the signal-to-noise ratio (SNR) and the Trojan-to-circuit ...
C. Sun +5 more
doaj +1 more source
Trojan-horse attacks threaten the security of practical quantum cryptography [PDF]
A quantum key distribution system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack.
Anisimova, Elena +5 more
core +3 more sources
A Novel Semi-Supervised Adversarially Learned Meta-Classifier for Detecting Neural Trojan Attacks
Deep neural networks (DNNs) are highly vulnerable to neural Trojan attacks. To carry out such an attack, an adversary retrains a DNN with poisoned data or modifies its parameters to produce incorrect output.
Shahram Ghahremani +3 more
doaj +1 more source
The differing magnitude distributions of the two Jupiter Trojan color populations [PDF]
The Jupiter Trojans are a significant population of minor bodies in the middle Solar System that have garnered substantial interest in recent years. Several spectroscopic studies of these objects have revealed notable bimodalities with respect to near ...
Brown, Michael E. +2 more
core +3 more sources
Hardware Trojan Detection Method Based on Hidden Markov Model [PDF]
Hardware Trojan causes a huge threat to the reliability of the integrated circuit chips,so this paper proposes a Trojan detection method based on Hidden Markov Model(HMM).It extracts the characteristic parameters of original circuit data,trains the ...
GAO Zhenbin,BAI Xue,YANG Song,HE Jiaji
doaj +1 more source

