نتایج جستجو برای: hardware trojan horses
تعداد نتایج: 123234 فیلتر نتایج به سال:
T he rapid growth of the World Wide Web and advances in networking technology have made it more important than ever to secure personal computers and operating systems. Individual users as well as enterprises need to know that the systems they are using will not divulge personal or copyrighted information to hackers or accept viruses, worms, Trojan horses, or unsolicited e-mail that can slow or ...
Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique
With the globalization of semiconductor industry, hardware Trojans (HTs) are an emergent security threat in modern integrated circuit (IC) production. Research is now being conducted into designing more accurate and efficient methods to detect HTs. Recently, a number machine learning (ML)-based HT detection approaches have been proposed; however, most them still use knowledge-driven design feat...
Monocytes perform diverse roles during infection with the facultative intracellular bacterium Listeria monocytogenes. They are essential as bactericidal cells in host defense but can also become Trojan horses transporting bacteria into the brain. To explain these contrasting roles, we characterized bone marrow (BM) monocytes in steady state and generated during lethal and sublethal L. monocytog...
In order to lower costs, the fabrication of Integrated Circuits (ICs) is increasingly delegated offshore contract foundries, making them exposed malicious modifications, known as hardware Trojans. Recent works have demonstrated that a strong form Trojan-resilience can be obtained from untrusted chips by exploiting secret sharing and Multi-Party Computation (MPC), yet with significant cost overh...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید