Results 31 to 40 of about 32,756 (234)
Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph [PDF]
As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns.
Jang, Jae-wook +4 more
core +3 more sources
Trojan Detection Test for Clockless Circuits
Clockless integrated circuits, as any type of integrated system, might today carry hardware Trojan (HT) circuits maliciously implanted in the designs during outsourced phases of fabrication. This paper proposes a testing technique dedicated to detect HTs in clockless circuits fabricated in CMOS technologies.
Ricardo Aquino Guazzelli +5 more
openaire +2 more sources
The ageing phenomenon of negative bias temperature instability (NBTI) continues to challenge the dynamic thermal management of modern FPGAs. Increased transistor density leads to thermal accumulation and propagates higher and non-uniform temperature ...
Sohaib Aslam +4 more
doaj +1 more source
Population and Size Distribution of Small Jovian Trojan Asteroids [PDF]
We present a study of Jovian Trojan objects detected serendipitously during the course of a sky survey conducted at the University of Hawaii 2.2-meter telescope.
Chadwick A. Trujillo +8 more
core +2 more sources
Engineering of fluorescent or photoactive Trojan probes for detection and eradication of β-Amyloids
Trojan horse technology institutes a potentially promising strategy to bring together a diagnostic or cell-based drug design and a delivery platform.
Amal A. Aziz +2 more
doaj +1 more source
Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems
Internet of Things (IoT) and Cyber-Physical Systems (CPS) have profoundly influenced the way individuals and enterprises interact with the world. Although attacks on IoT devices are becoming more commonplace, security metrics often focus on software ...
Anju P. Johnson +2 more
doaj +1 more source
Invisible Trojan-horse attack [PDF]
We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique.
Jain, Nitin +3 more
core +2 more sources
Using deep learning to detect digitally encoded DNA trigger for Trojan malware in Bio-Cyber attacks
This article uses Deep Learning technologies to safeguard DNA sequencing against Bio-Cyber attacks. We consider a hybrid attack scenario where the payload is encoded into a DNA sequence to activate a Trojan malware implanted in a software tool used in ...
M. S. Islam +7 more
doaj +1 more source
Insertion of hardware Trojans (HTs) in integrated circuits is a pernicious threat. Since HTs are activated under rare trigger conditions, detecting them using random logic simulations is infeasible. In this work, we design a reinforcement learning (RL) agent that circumvents the exponential search space and returns a minimal set of patterns that is ...
Gohil, Vasudev +5 more
openaire +2 more sources
Hardware Trojan Detection Based on Long Short-Term Memory Neural Network [PDF]
Hardware Trojans pose a huge threat to the reliability of integrated circuit chips.Therefore,this paper proposes a hardware Trojan detection method based on Principal Component Analysis(PCA) and Long Short-Term Memory(LSTM) neural network.The method uses
HU Tao, DIAN Songyi, JIANG Ronghua
doaj +1 more source

