نتایج جستجو برای: hardware trojan horses
تعداد نتایج: 123234 فیلتر نتایج به سال:
If a government auctions the right to market a good, continuity is likely to be of significant importance. In a laboratory experiment, we compare the effects of bidders’ limited liability in the first-price sealed-bid auction and the English auction in a common value setting. Our data strongly reject our theoretical prediction that the English auction leads to less aggressive bids and fewer ban...
BACKGROUND Porous silicon particles (PSiPs) have been used extensively as drug delivery systems, loaded with chemical species for disease treatment. It is well known from silicon producers that silicon is characterized by a low reduction potential, which in the case of PSiPs promotes explosive oxidation reactions with energy yields exceeding that of trinitrotoluene (TNT). The functionalization ...
Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some type of subversion, often called a Hardware Trojan or malicious inclusion. Detecting these has proved...
Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some type of subversion, often called a Hardware Trojan or malicious inclusion. Detecting these has proved...
With advances in automobile electronics, we find a rapid proliferation of embedded systems in cars, both in safety-critical applications and for passenger comfort. These embedded systems are increasingly networked for their operation and enhanced functionality. However, the increased connectivity of embedded systems also greatly complicates design, increases the number of failure modes, and int...
The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during the design process. Recent research is performed to detect Trojans embedded at manufacturing time by comparing the suspected chip with a golden c...
In this paper we present a novel solution to address the problem of potential malicious circuitry on FPGA. This method is based on an a technique of structure extraction which consider the infection of an all lot. This structure is related to the design (place and route, power grid. . . ) of the integrated circuits which composes the lot. In case of additional circuitry this design will be modi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید