نتایج جستجو برای: hardware trojan horses

تعداد نتایج: 123234  

2013
Yu Liu Yier Jin Yiorgos Makris

We present a silicon implementation of a hardware Trojan, which is capable of leaking the secret key of a wireless cryptographic integrated circuit (IC) consisting of an Advanced Encryption Standard (AES) core and an Ultra-WideBand (UWB) transmitter. With its impact carefully hidden in the transmission specification margins allowed for process variations, this hardware Trojan cannot be detected...

2015
Sayandeep Saha Rajat Subhra Chakraborty Srinivasa Shashank Nuthakki Anshul Debdeep Mukhopadhyay

Test generation for Hardware Trojan Horses (HTH) detection is extremely challenging, as Trojans are designed to be triggered by very rare logic conditions at internal nodes of the circuit. In this paper, we propose a Genetic Algorithm (GA) based Automatic Test Pattern Generation (ATPG) technique, enhanced by automated solution to an associated Boolean Satisfiability problem. The main insight is...

2017
Sree Ranjani Nirmala Devi

Hardware security is an emerging topic in integrated-circuit (IC) industries. Research in the domain of the hardware security is at a full swing and many schemes to enhance the security are being explored. The hardware Trojan (HT) design and its various detection techniques to ensure the trust in design are the most sought for schemes. The analysis of the reported techniques explores the major ...

2014
Carla C. C. R. de Carvalho Pedro Fernandes

Microbial drug resistance is partly due to hindered diffusion through the membrane of microbial cells and active transport mechanisms. An approach to counter such resistance uses the bacterial iron transport system. Extracellular free iron is scarce in vertebrates, yet essential for microbial growth (Anderson et al., 2012). A mechanism displayed by microbial pathogens to cope with iron scarcity...

1997
Dan Thomsen

This paper presents a technique for allowing untrusted database applications to perform trusted operations. The approach is based on the TCB subset architecture with a commercial database and a small amount of easily assurable, generic, trusted code for the multilevel operations. The approach uses a trusted path mechanism to stop the threat of Trojan horses.

Journal: :Computers & Security 1996
Frederick B. Cohen

In this paper, we describe a new class of highly distributed coordinated attacks and methods used for tracking down their sources. Search terms: Information Protection, Auditing, Trojan Horses, Distributed Computation, Coordinated Attacks, Distributed Coordinated Attacks Copyright c © 1996, Fred Cohen ALL RIGHTS RESERVED ‡ This research was funded by Management Analytics, PO Box 1480, Hudson, O...

Journal: :IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2012

2011
Youngjune Gwon H. T. Kung Dario Vlah

Detecting Trojans in an integrated circuit (IC) is an important but hard problem. A Trojan is malicious hardware—it can be extremely small in size and dormant until triggered by some unknown circuit state. To allow wake-up, a Trojan could draw a minimal amount of power, for example, to run a clock or a state machine, or to monitor a triggering event. We introduce DISTROY (Discover Trojan), a ne...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید