نتایج جستجو برای: hardware trojan horses

تعداد نتایج: 123234  

Journal: :CoRR 2016
Amr Al-Anwar Mona A. Aboelnaga Yousra Alkabani M. Watheq El-Kharashi Hassan Bedour

Hardware Trojan detection and protection is becoming more crucial as more untrusted third parties manufacture many parts of critical systems nowadays. The most common way to detect hardware Trojans is comparing the untrusted design with a golden (trusted) one. However, third party intellectual properties (IPs) are black boxes with no golden IPs to trust. So, previous attempts to detect hardware...

Journal: :DEStech Transactions on Computer Science and Engineering 2017

Journal: :Indian Journal of Science and Technology 2016

Journal: :Security and Communication Networks 2021

In the hardware Trojan detection field, destructive reverse engineering and bypass are both important methods. This paper proposed an evolutionary algorithm called Ordered Mixed Feature GEP (OMF-GEP), trying to restore circuit structure only by using information. was developed from basic through three sets of experiments at different stages. To solve problem, this transformed introducing mixed ...

Journal: :Informatica (Slovenia) 2002
Adrian Spalka Armin B. Cremers Hanno Langweg

Electronic signatures are introduced by more and more countries as legally binding means for signing electronic documents with the primary hope of boosting e-commerce and e-government. Given that the underlying cryptographic methods are sufficiently strong, attacks by Trojan horse programs on electronic signatures are becoming increasingly popular. Most of the current systems either employ cost...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید