نتایج جستجو برای: hardware trojan horses

تعداد نتایج: 123234  

Journal: :DEStech Transactions on Computer Science and Engineering 2018

Journal: :IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2023

Owning a high-end semiconductor foundry is luxury very few companies can afford. Thus, fabless design outsource integrated circuit fabrication to third parties. Within foundries, rogue elements may gain access the customer’s layout and perform malicious acts, including insertion of hardware trojan (HT). Many works focus on structure/effects HT, while have demonstrated viability their HTs in sil...

2004
Sébastien Varrette Jean-Louis Roch Yves Denneulin Franck Leprévost

For applications like multi-physics simulations or complex data analysis, todays needs in computations require to gather thousands of computers geographically scattered and interconnected throw the Internet. Also the use of large scale global computing platforms – from a grid that couples several clusters of computers to peer-to-peer systems – has been experimented for some compute intensive hi...

2012
Byeongju Cha Sandeep K. Gupta Ming Hsieh

One of the growing issues in IC design is how to authenticate chips fabricated by untrusted vendors. Such authentication, often called Trojan detection, is challenging since the specifics of hardware Trojans inserted by intelligent adversaries are difficult to predict and most Trojans do not affect the logic behavior of the circuit unless they are activated. Also, Trojan detection via parametri...

Journal: :Electronics Letters 2021

Approximate computing can accept errors in computation systems to achieve better utilisation of hardware resources. has been successfully developed integrated circuits, such as approximate arithemtic circuits and accelerators. Unfortunately, recent works show that also have security vulnerabilities. Hardware Trojan is one the biggest threats security. However, very limited research conducted on...

Journal: :International Journal for the Scholarship of Teaching and Learning 2010

Journal: :Critical Research on Religion 2021

Understanding the ways in which Muslims are turned into “a problem” requires an analytic incorporating insights gained through concepts of Islamophobia and anti-Muslim racism a larger frame. The “Muslim Question” can provide such frame by attending to systematic character this form racism, explored here biopolitics. This article develops conceptualization Europe’s along three lines. First, emer...

2013
Tiit Pikma Dominique Unruh

With the increase in outsourcing manufacturing of integrated circuits to di erent countries, the topic of trust and security becomes more and more important. The built circuits could contain some malicious modi cations introduced during production, known as hardware trojans. Common ways of detecting these modi cation include optical inspection with electron-microscopes, comparing side-channel i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید