Results 31 to 40 of about 32,756 (234)

Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph [PDF]

open access: yes, 2015
As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns.
Jang, Jae-wook   +4 more
core   +3 more sources

Trojan Detection Test for Clockless Circuits

open access: yesJournal of Electronic Testing, 2020
Clockless integrated circuits, as any type of integrated system, might today carry hardware Trojan (HT) circuits maliciously implanted in the designs during outsourced phases of fabrication. This paper proposes a testing technique dedicated to detect HTs in clockless circuits fabricated in CMOS technologies.
Ricardo Aquino Guazzelli   +5 more
openaire   +2 more sources

Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric–Detection Methodology and Mitigation

open access: yesIEEE Access, 2020
The ageing phenomenon of negative bias temperature instability (NBTI) continues to challenge the dynamic thermal management of modern FPGAs. Increased transistor density leads to thermal accumulation and propagates higher and non-uniform temperature ...
Sohaib Aslam   +4 more
doaj   +1 more source

Population and Size Distribution of Small Jovian Trojan Asteroids [PDF]

open access: yes, 2000
We present a study of Jovian Trojan objects detected serendipitously during the course of a sky survey conducted at the University of Hawaii 2.2-meter telescope.
Chadwick A. Trujillo   +8 more
core   +2 more sources

Engineering of fluorescent or photoactive Trojan probes for detection and eradication of β-Amyloids

open access: yesDrug Delivery, 2020
Trojan horse technology institutes a potentially promising strategy to bring together a diagnostic or cell-based drug design and a delivery platform.
Amal A. Aziz   +2 more
doaj   +1 more source

Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems

open access: yesSensors, 2020
Internet of Things (IoT) and Cyber-Physical Systems (CPS) have profoundly influenced the way individuals and enterprises interact with the world. Although attacks on IoT devices are becoming more commonplace, security metrics often focus on software ...
Anju P. Johnson   +2 more
doaj   +1 more source

Invisible Trojan-horse attack [PDF]

open access: yes, 2017
We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique.
Jain, Nitin   +3 more
core   +2 more sources

Using deep learning to detect digitally encoded DNA trigger for Trojan malware in Bio-Cyber attacks

open access: yesScientific Reports, 2022
This article uses Deep Learning technologies to safeguard DNA sequencing against Bio-Cyber attacks. We consider a hybrid attack scenario where the payload is encoded into a DNA sequence to activate a Trojan malware implanted in a software tool used in ...
M. S. Islam   +7 more
doaj   +1 more source

DETERRENT

open access: yesProceedings of the 59th ACM/IEEE Design Automation Conference, 2022
Insertion of hardware Trojans (HTs) in integrated circuits is a pernicious threat. Since HTs are activated under rare trigger conditions, detecting them using random logic simulations is infeasible. In this work, we design a reinforcement learning (RL) agent that circumvents the exponential search space and returns a minimal set of patterns that is ...
Gohil, Vasudev   +5 more
openaire   +2 more sources

Hardware Trojan Detection Based on Long Short-Term Memory Neural Network [PDF]

open access: yesJisuanji gongcheng, 2020
Hardware Trojans pose a huge threat to the reliability of integrated circuit chips.Therefore,this paper proposes a hardware Trojan detection method based on Principal Component Analysis(PCA) and Long Short-Term Memory(LSTM) neural network.The method uses
HU Tao, DIAN Songyi, JIANG Ronghua
doaj   +1 more source

Home - About - Disclaimer - Privacy