نتایج جستجو برای: hardware trojan horses

تعداد نتایج: 123234  

2009
Hassan Salmani Mohammad Tehranipoor Jim Plusquellic

Malicious activities and alterations in integrated circuits have raised serious concerns to government agencies and semiconductor industry. The added functionality, known as hardware Trojan, poses great detection and isolation challenges. This paper presents a novel layout-aware scan-cell reordering method to localize design switching into a specific region and improve hardware Trojan detection...

2016
Xing Cao Degang J. Chen Meng Lu

Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single positive feedback loop. By example, it is shown...

1993
Myong H. Kang Ira S. Moskowitz

Communication from a low-to a high-level system without acknowledgements will be unreliable; with acknowledgements, it can be insecure. We propose to provide quantiiable security, acceptable reliability, and minimal performance penalties by interposing a device (called the Pump) to push messages to the high system and provide a controlled stream of acknowledgements to the low system. This paper...

2000
Arnd Weber

As electronic commerce will increase, players will increasingly wish to have signed documents and strong encryption. According to current knowledge, it must be expected that the costs of attacking, through Trojan horses, crypto impleme ntations on computers with mainstream operating systems, are low. This threatens legal certainty, either because such Trojan horses will emerge, or because their...

Journal: :IEEE Transactions on Circuits and Systems I-regular Papers 2022

We propose a Hardware Trojan (HT) attack for analog circuits with its key characteristic being that it cannot be prevented or detected in the domain. The HT works context of Systems-on-Chip (SoCs) comprising both digital and Intellectual Property (IP) blocks. attacker could either SoC integrator foundry. More specifically, trigger is placed inside dense IP block where can effectively hidden, wh...

Journal: :CoRR 2009
Yuriy Shiyanovskii Francis G. Wolff Christos A. Papachristou Daniel J. Weyer W. Clay

This paper discusses how hot carrier injection (HCI) can be exploited to create a trojan that will cause hardware failures. The trojan is produced not via additional logic circuitry but by controlled scenarios that maximize and accelerate the HCI effect in transistors. These scenarios range from manipulating the manufacturing process to varying the internal voltage distribution. This new type o...

Journal: :Computers & Security 2009
Gedare Bloom Bhagirath Narahari Rahul Simha Joseph Zambreno

Integrated circuits (ICs) are often produced in foundries that lack effective security controls. In these foundries, sophisticated attackers are able to insert malicious Trojan circuits that are easily hidden in the large, complex circuitry that comprises modern ICs. These so-called Trojan circuits are capable of launching attacks directly in hardware, or, more deviously, can facilitate softwar...

Journal: :IACR Cryptology ePrint Archive 2017
Maik Ender Samaneh Ghandali Amir Moradi Christof Paar

Hardware Trojans have gained high attention in academia, industry and by government agencies. The effective detection mechanisms and countermeasures against such malicious designs are only possible when there is a deep understanding of how hardware Trojans can be built in practice. In this work, we present a mechanism which shows how easily a stealthy hardware Trojan can be inserted in a provab...

2017
Gudapati Ramyasri

Due to growing of semiconductor industry and the increasing demand in fabricating digital integrated circuit, are now facing problem with a hardware threat which is known as hardware Trojan horse. Hardware Trojan (HT) results in harmful, unauthenticated modification to integrated circuit (IC), which is a major part of electronics. The modification may leak important information ,causing the sys...

2009
J. Rajendran

Recently, there have been reports of trojans being inserted at hardware. We propose a trojan detection method which uses ring oscillators to detect trojans that are inserted at gate level. We designed a trojan that bypasses the cryptohardware module when activated. We also analyze other teams trojan detection methods and compare it with our design.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید