نتایج جستجو برای: hardware trojan horses

تعداد نتایج: 123234  

Journal: :IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2017

Journal: :IACR Cryptology ePrint Archive 2016
Samaneh Ghandali Georg T. Becker Daniel Holcomb Christof Paar

Over the last decade, hardware Trojans have gained increasing attention in academia, industry and by government agencies. In order to design reliable countermeasures, it is crucial to understand how hardware Trojans can be built in practice. This is an area that has received relatively scant treatment in the literature. In this contribution, we examine how particularly stealthy Trojans can be i...

Journal: :Signal Processing Systems 2017
Elena Dubrova Mats Näslund Gunnar Carlsson John Fornehed Ben J. M. Smeets

The threat of hardware Trojans has been widely recognized by academia, industry, and government agencies. A Trojan can compromise security of a system in spite of cryptographic protection. The damage caused by a Trojan may not be limited to a business or reputation, but could have a severe impact on public safety, national economy, or national security. An extremely stealthy way of implementing...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید