نتایج جستجو برای: hardware trojan horses

تعداد نتایج: 123234  

2011
Sander Onderstal Ailko van der Veen

If a government auctions the right to market a good, continuity is likely to be of significant importance. In a laboratory experiment, we compare the effects of bidders’ limited liability in the first-price sealed-bid auction and the English auction in a common value setting. Our data strongly reject our theoretical prediction that the English auction leads to less aggressive bids and fewer ban...

2014
Roberto Fenollosa Eduardo Garcia-Rico Susana Alvarez Rosana Alvarez Xiang Yu Isabel Rodriguez Susana Carregal-Romero Carlos Villanueva Manuel Garcia-Algar Pilar Rivera-Gil Angel R de Lera Wolfgang J Parak Francisco Meseguer Ramón A Alvarez-Puebla

BACKGROUND Porous silicon particles (PSiPs) have been used extensively as drug delivery systems, loaded with chemical species for disease treatment. It is well known from silicon producers that silicon is characterized by a low reduction potential, which in the case of PSiPs promotes explosive oxidation reactions with energy yields exceeding that of trinitrotoluene (TNT). The functionalization ...

2011
Michael B. Bilzor Ted Huffmire

Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some type of subversion, often called a Hardware Trojan or malicious inclusion. Detecting these has proved...

2010
Michael B. Bilzor Ted Huffmire

Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some type of subversion, often called a Hardware Trojan or malicious inclusion. Detecting these has proved...

2004
Arvind Seshadri Adrian Perrig Leendert van Doorn Pradeep Khosla

With advances in automobile electronics, we find a rapid proliferation of embedded systems in cars, both in safety-critical applications and for passenger comfort. These embedded systems are increasingly networked for their operation and enhanced functionality. However, the increased connectivity of embedded systems also greatly complicates design, increases the number of failure modes, and int...

2014
Hany A.M. Amin Yousra Alkabani Gamal M.I. Selim

The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during the design process. Recent research is performed to detect Trojans embedded at manufacturing time by comparing the suspected chip with a golden c...

Journal: :IACR Cryptology ePrint Archive 2015
Maxime Lecomte Jacques J. A. Fournier Philippe Maurine

In this paper we present a novel solution to address the problem of potential malicious circuitry on FPGA. This method is based on an a technique of structure extraction which consider the infection of an all lot. This structure is related to the design (place and route, power grid. . . ) of the integrated circuits which composes the lot. In case of additional circuitry this design will be modi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید