نتایج جستجو برای: hardware trojan horses
تعداد نتایج: 123234 فیلتر نتایج به سال:
In the recent years, hardware trojans have become a serious issue in the field of integrated circuits. Our work presents a framework for hardware trojan detection in wireless cryptographic integrated circuits. It deals with the leaking of secret information through a wireless communication, using a mixed-signal integrated circuit technique. A trojan is inserted in the introduced system, which d...
Not long ago, it was thought that only software applications and general purpose digital systems i.e. computers were prone to various types of attacks against their security. The underlying hardware, hardware implementations of these software applications, embedded systems, and hardware devices were considered to be secure and out of reach of these attacks. However, during the previous few year...
Software for the creation of digital signatures performs a delicate task. The signatory has to trust the manufacturer of the software that it will work in the intended way. Signing a document electronically will have legal consequences in a growing number of countries, therefore the security of the signing software is an important issue. In the past, Trojan horse programs have shown to be of gr...
Integrated Circuit (IC) manufacturing has become an increasingly global process, which leads to the growing threat of hardware Trojan attacks. In the absence of a trusted supply chain model, post-manufacturing detection of hardware Trojans has gained relevance in commercial and military applications, where trusted field operation is critical. In a distributed manufacturing chain, there are seve...
The globalization of the Integrated Circuit (IC) supply chain has moved most design, fabrication, and testing process from a single trusted entity to various untrusted third party entities around world. risk using third-Party Intellectual Property (3PIP) is possibility for adversaries insert malicious modifications known as Hardware Trojans (HTs). These HTs can compromise integrity, deteriorate...
One of the most high profie threats to information integrity is the computer virus. In this paper, I am presenting what are viruses, worms, and Trojan horses and their differences, different strategies of virus spreading and case studies of Slammer and Blaster worms.
Due to the globalization of the integrated circuit manufacturing industry, hardware Trojans constitutes an increasingly probable threat to both military and commercial applications. The Trojans being stealthy in nature, the Trojan hardware is hard to be triggered under random patterns. In this paper, we propose practical test patterns generation technique based on rare logic conditions at inter...
Recently, the great demand for integrated circuits (ICs) drives third parties to be involved in IC design and manufacturing steps. At same time, threat of injecting a malicious circuit, called hardware Trojan, by has been increasing. Machine learning is one powerful solutions detecting Trojans. However, weakness such machine-learning-based classification method against adversarial examples (AEs...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید