نتایج جستجو برای: hardware trojan horses
تعداد نتایج: 123234 فیلتر نتایج به سال:
Owning a high-end semiconductor foundry is luxury very few companies can afford. Thus, fabless design outsource integrated circuit fabrication to third parties. Within foundries, rogue elements may gain access the customer’s layout and perform malicious acts, including insertion of hardware trojan (HT). Many works focus on structure/effects HT, while have demonstrated viability their HTs in sil...
For applications like multi-physics simulations or complex data analysis, todays needs in computations require to gather thousands of computers geographically scattered and interconnected throw the Internet. Also the use of large scale global computing platforms – from a grid that couples several clusters of computers to peer-to-peer systems – has been experimented for some compute intensive hi...
One of the growing issues in IC design is how to authenticate chips fabricated by untrusted vendors. Such authentication, often called Trojan detection, is challenging since the specifics of hardware Trojans inserted by intelligent adversaries are difficult to predict and most Trojans do not affect the logic behavior of the circuit unless they are activated. Also, Trojan detection via parametri...
Approximate computing can accept errors in computation systems to achieve better utilisation of hardware resources. has been successfully developed integrated circuits, such as approximate arithemtic circuits and accelerators. Unfortunately, recent works show that also have security vulnerabilities. Hardware Trojan is one the biggest threats security. However, very limited research conducted on...
Understanding the ways in which Muslims are turned into “a problem” requires an analytic incorporating insights gained through concepts of Islamophobia and anti-Muslim racism a larger frame. The “Muslim Question” can provide such frame by attending to systematic character this form racism, explored here biopolitics. This article develops conceptualization Europe’s along three lines. First, emer...
With the increase in outsourcing manufacturing of integrated circuits to di erent countries, the topic of trust and security becomes more and more important. The built circuits could contain some malicious modi cations introduced during production, known as hardware trojans. Common ways of detecting these modi cation include optical inspection with electron-microscopes, comparing side-channel i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید