نتایج جستجو برای: hardware trojan horses
تعداد نتایج: 123234 فیلتر نتایج به سال:
Malicious activities and alterations in integrated circuits have raised serious concerns to government agencies and semiconductor industry. The added functionality, known as hardware Trojan, poses great detection and isolation challenges. This paper presents a novel layout-aware scan-cell reordering method to localize design switching into a specific region and improve hardware Trojan detection...
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single positive feedback loop. By example, it is shown...
Communication from a low-to a high-level system without acknowledgements will be unreliable; with acknowledgements, it can be insecure. We propose to provide quantiiable security, acceptable reliability, and minimal performance penalties by interposing a device (called the Pump) to push messages to the high system and provide a controlled stream of acknowledgements to the low system. This paper...
As electronic commerce will increase, players will increasingly wish to have signed documents and strong encryption. According to current knowledge, it must be expected that the costs of attacking, through Trojan horses, crypto impleme ntations on computers with mainstream operating systems, are low. This threatens legal certainty, either because such Trojan horses will emerge, or because their...
We propose a Hardware Trojan (HT) attack for analog circuits with its key characteristic being that it cannot be prevented or detected in the domain. The HT works context of Systems-on-Chip (SoCs) comprising both digital and Intellectual Property (IP) blocks. attacker could either SoC integrator foundry. More specifically, trigger is placed inside dense IP block where can effectively hidden, wh...
This paper discusses how hot carrier injection (HCI) can be exploited to create a trojan that will cause hardware failures. The trojan is produced not via additional logic circuitry but by controlled scenarios that maximize and accelerate the HCI effect in transistors. These scenarios range from manipulating the manufacturing process to varying the internal voltage distribution. This new type o...
Integrated circuits (ICs) are often produced in foundries that lack effective security controls. In these foundries, sophisticated attackers are able to insert malicious Trojan circuits that are easily hidden in the large, complex circuitry that comprises modern ICs. These so-called Trojan circuits are capable of launching attacks directly in hardware, or, more deviously, can facilitate softwar...
Hardware Trojans have gained high attention in academia, industry and by government agencies. The effective detection mechanisms and countermeasures against such malicious designs are only possible when there is a deep understanding of how hardware Trojans can be built in practice. In this work, we present a mechanism which shows how easily a stealthy hardware Trojan can be inserted in a provab...
Due to growing of semiconductor industry and the increasing demand in fabricating digital integrated circuit, are now facing problem with a hardware threat which is known as hardware Trojan horse. Hardware Trojan (HT) results in harmful, unauthenticated modification to integrated circuit (IC), which is a major part of electronics. The modification may leak important information ,causing the sys...
Recently, there have been reports of trojans being inserted at hardware. We propose a trojan detection method which uses ring oscillators to detect trojans that are inserted at gate level. We designed a trojan that bypasses the cryptohardware module when activated. We also analyze other teams trojan detection methods and compare it with our design.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید