Zobrazeno 1 - 10
of 2 513
pro vyhledávání: '"hardware Trojan"'
Publikováno v:
网络与信息安全学报, Vol 10, Iss 4, Pp 72-84 (2024)
Addressing the issue that research on hardware Trojan (HT) has predominantly focused on specific strategies of HT design and defense, with a deficiency in quantitative evaluation models for system security in the context of HT attacks, a HT attack an
Externí odkaz:
https://doaj.org/article/b938da524fe44d79ae3583136ef6dafc
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-13 (2024)
Abstract Hardware Trojans (HTs) are hidden threats embedded in the circuitry of integrated circuits (ICs), enabling unauthorized access, data theft, operational disruptions, or even physical harm. Detecting Hardware Trojans (HTD) is paramount for ens
Externí odkaz:
https://doaj.org/article/57444429652d433f99c100ec3d8fe2e8
Publikováno v:
IEEE Access, Vol 12, Pp 150623-150638 (2024)
Electromagnetic (EM) radiation-based hardware assurance methods are gaining prominence due to their non-invasive nature of monitoring the chip activity and the potential for continuous monitoring of integrated circuits (ICs) during operation. This pa
Externí odkaz:
https://doaj.org/article/4b4c300bf6c1485ebba66f083dd80756
Publikováno v:
Cryptography, Vol 8, Iss 3, p 36 (2024)
Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime, making them ideal for applications such as data centers, cloud computing, and edge computing. This reconfiguration, often achieved through remote access, ena
Externí odkaz:
https://doaj.org/article/93fcdc283dc84ef1a83f109a274020e2
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Data, Vol 9, Iss 6, p 82 (2024)
Although hardware trojans impose a relevant threat to the hardware security of RISC-V and Web3 applications, existing datasets have a limited set of examples, as the most famous hardware trojan dataset TrustHub has 106 different trojans. RISC-V speci
Externí odkaz:
https://doaj.org/article/350c2b1dc37a43e0831328c012d3346a
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 10, Pp 101822- (2023)
Due to technical barriers and economic costs, malicious circuits, known as hardware Trojans, are easily implanted in the complicated integrated circuit design and manufacturing process, which can lead to many disastrous consequences, such as denial o
Externí odkaz:
https://doaj.org/article/9ae7bbeeee8645648f500769598f6e76
Publikováno v:
IEEE Access, Vol 11, Pp 46073-46083 (2023)
Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstractio
Externí odkaz:
https://doaj.org/article/27517690cb354ebf8296a238930e3381
Publikováno v:
Micromachines, Vol 15, Iss 1, p 149 (2024)
Convolutional neural networks (CNNs) have demonstrated significant superiority in modern artificial intelligence (AI) applications. To accelerate the inference process of CNNs, reconfigurable CNN accelerators that support diverse networks are widely
Externí odkaz:
https://doaj.org/article/67f229b415984ad7a86f2439d5bb0031
Publikováno v:
IET Computers & Digital Techniques, Vol 16, Iss 2-3, Pp 54-70 (2022)
Abstract Coping with the problem of malicious third‐party vendors implanting Hardware Trojan (HT) in the circuit design stage, this paper proposes a hybrid‐mode gate‐level hardware Trojan detection platform based on the XGBoost algorithm. This
Externí odkaz:
https://doaj.org/article/34e42076254e4e36a6baf66ef383ed85