نتایج جستجو برای: hardware trojan horses
تعداد نتایج: 123234 فیلتر نتایج به سال:
The separation design and fabrication process in the semiconductor industry leads to potential threats such as trojan side-channels (TSCs). In this paper we design a new family of TSCs from physical unclonable functions (PUFs). In particular, a dedicated attack on the PRESENT block cipher is described by using our PUF-based TSCs. Finally we analyze the performance of our PUF-based TSCs and disc...
A hardware trojan is a modification to a hardware design which inserts undesired or malicious functionality to the design. They pose a substantial security risk, and rapid, reliable detection of these trojans has become a critical necessity. In this paper, we propose a method for detecting compromised designs quickly and effectively. The process involves a multi-parameter analysis of the design...
Copyright violations are an increasing problem for hardware designers. Illegal copies of IP cores can cost manufactures millions of dollars. As one possible solution to this problem, digital watermarking for integrated circuits has been proposed in the past. We propose a new watermarking mechanism that is based on side-channels and that can easily and reliably be detected. The idea is to embed ...
Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with various means to steal the internal sensitive data or modify original functionality, which may lead to huge economic losses and great harm to society. Therefore, it is very important to analyze the specific HT threats existing in the whole life cycle of integrated circuits (ICs), and perform protection against hardwar...
Computer hardware and Internet is growing so fast today, security threats of malicious executable code are getting more serious. Basically, malicious executable codes are categorized into three kinds – virus, Spam, Trojan horse, and worm. Current anti-virus products cannot detect all the malicious codes, especially for those unseen, polymorphism malicious
This paper proposes AdaTest, a novel adaptive test pattern generation framework for efficient and reliable Hardware Trojan (HT) detection. HT is backdoor attack that tampers with the design of victim integrated circuits (ICs) . AdaTest improves existing detection techniques in terms scalability accuracy detecting smaller Trojans presence noise variations. To achieve high trigger coverage, lever...
The proliferation of smart-phone devices, with ever advancing technological features, has brought the issue of mobile device security back into focus. Mobile devices are rapidly becoming attractive targets for malicious attacks due to significant advances in both hardware and operating systems. The modern mobile platforms, like Android, iOS and Symbian, increasingly resemble traditional operati...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید