نتایج جستجو برای: hardware trojan horses

تعداد نتایج: 123234  

2013

Viruses, Trojan horses, worms, back doors, spoofing, DoS attacks, and other cyber-security threats are now part of everyone’s computer vocabulary. What’s next? For all of its promise, the Internet of Things is likely to become the greatest challenge for security technology to date, defying conventional security solutions, paradigms, and tools. The Internet of Things is a global revolution in wh...

2017
Steven Arzt Michael Pradel

Context Android dominates the handheld devices market with more than 80% marketshare. Needless to say, such popularity encourages malware authors to write and distribute malicious applications (hereafter apps) that target Android devices. To smoothen the spread of their malicious apps, malware authors tend to design their instances to mimick the appearance and behavior of benign apps (e.g., gam...

2017
Felipe H Santiago-Tirado Tamara L Doering

Humans are constantly exposed to pathogenic microbes. The first line of cellular host defense is composed of “professional” phagocytes, cells that efficiently recognize pathogens, internalize them, and then marshal an array of antimicrobial mechanisms to destroy them. Nevertheless, successful pathogens evade or survive such attack. A particularly subversive strategy is to manipulate normal phag...

Journal: :IEEE Computer Architecture Letters 2022

As industry moves toward chiplet-based designs, the insertion of hardware Trojans poses a significant threat to security these systems. These systems rely heavily on cache coherence for coherent data communication, making an attractive target. Critically, unlike prior work, which focuses only malicious packet modifications, Trojan attack that exploits can modify in memory was never touched and ...

Journal: :Eurasip Journal on Wireless Communications and Networking 2022

Abstract Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to globalization IC design manufacturing. Malicious circuits, also known as hardware Trojans, are found able degrade performance or even leak confidential information, accordingly it is definitely an immediate concern develop detection techniques against Trojans. This paper presents...

Journal: :Tsinghua Science & Technology 2021

Hardware Trojans (HTs) have drawn increasing attention in both academia and industry because of their significant potential threat. In this paper, we propose HTDet, a novel HT detection method using information entropy-based clustering. To maintain high concealment, HTs are usually inserted the regions with low controllability observability, which will result that Trojan logics extremely transi...

Journal: :International Journal of Computing and Digital Systems 2016

Journal: :International journal of engineering. Transactions A: basics 2022

The rapid growth in the supply chain of electronic devices has led companies to purchase Intellectual Property or Integrated Circuits from unreliable sources. This dispersion design fabrication stages IP/IC new attacks called hardware Trojans. Hardware Trojans can bargain information, reduce performance, cause failure. Various methods have been introduced detect prevent Machine learning are one...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید