نتایج جستجو برای: hardware trojan horses
تعداد نتایج: 123234 فیلتر نتایج به سال:
The globalization of the integrated circuit (IC) supply chain has moved most design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities worldwide. risk using third-Party Intellectual Property (3PIP) is possibility for adversaries insert malicious modifications known as Hardware Trojans (HTs). These HTs can compromise integrity, deteriorate pe...
This paper discusses the possible introduction of hidden reliability defects during CMOS foundry fabrication processes that may lead to accelerated wearout of the devices. These hidden defects or hardware Trojans can be created by deviation from foundry design rules and processing parameters. The Trojans are produced by exploiting time-based wearing mechanisms (HCI, NBTI, TDDB and EM) and/or co...
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
Free-living amoebae (FLA) occupy a wide range of freshwater, marine, and soil habitats, and are opportunistic pathogens in human beings. While Acanthamoeba spp., Naegleria fowleri, and Balamuthia mandrillaris are well-known opportunistic organisms, Vannella epipetala is nonpathogenic. Sediments were collected from a freshwater source from a park in Jamaica to investigate the presence of FLA. Ac...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید