Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Anindan Mondal"'
Autor:
Sourav Roy, Dipnarayan Das, Anindan Mondal, Mahabub Hasan Mahalat, Bibhash Sen, Biplab Sikdar
Publikováno v:
IEEE Internet of Things Journal. 10:8547-8559
Autor:
Anindan Mondal, Shubrojyoti Karmakar, Mahabub Hasan Mahalat, Suchismita Roy, Bibhash Sen, Anupam Chattopadhyay
Publikováno v:
ACM Transactions on Embedded Computing Systems. 22:1-21
Hardware Trojans (HTs) are malicious manipulations of the standard functionality of an integrated circuit (IC). Sophisticated defense against HT attacks has become the utmost current research endeavor. In particular, the HTs whose operations depend o
Publikováno v:
ACM Journal on Emerging Technologies in Computing Systems.
Hardware Trojans (HT) are small circuits intentionally designed by an adversary for harmful purposes. These types of circuits are extremely difficult to detect. An HT often requires some specific signals to activate which is almost impossible to disc
Publikováno v:
2022 IEEE Bombay Section Signature Conference (IBSSC).
Publikováno v:
Journal of Electronic Testing. 37:317-328
Hardware Trojans (HT) have emerged as a significant threat to both the IC industry and the military due to their stealthy nature and destructive capabilities. An HT is a small piece of hardware (circuit) embedded by an adversary to disrupt the victim
Publikováno v:
International Journal of Electronics Letters. 8:83-96
Fast pace growth in the IC industry is facing the challenges of feature size reduction which in turn demands an alternative to current CMOS VLSI. Quantum-dot cellular automata are emerging as one o...
Autor:
Anindan Mondal, Bibhash Sen, Dipnarayan Das, Suchismita Roy, Sourav Roy, Mahabub Hasan Mahalat
Publikováno v:
SECRYPT
Publikováno v:
SoCC
Field Programmable Gate Array (FPGA) has become an attractive platform for faster growth of the Internet of Things (IoT). However, like other technologies, FPGA needs resilience against various threats. In addition, the un-monitored environment makes
Publikováno v:
ISED
Hardware Trojan has become a serious security issue in recent times for both integrated chip (IC) industry and government due to the separation of the design phase and manufacturing phase of the IC industrial model. Hardware Trojan is a malicious log
Publikováno v:
ISED
In the diverse, chaotic environment of the Internet of Things (IoT), the overlooked security issues in device design invite the biggest threat to adopt IoT due to its botnet. Being resource and computation intensive the traditional encryption based p