نتایج جستجو برای: hardware trojan horses
تعداد نتایج: 123234 فیلتر نتایج به سال:
World Wide Web electronic commerce applications often require consumers to enter private informa tion such as credit card numbers into forms in the browser window If third parties can insert trojan horse applications onto a consumer s machine they can monitor keyboard strokes and steal private infor mation This paper outlines a simple way to accomplish this using Java or similar remote executio...
Wild ducks are the main reservoir of influenza A viruses that can be transmitted to domestic poultry and mammals, including humans. Of the 16 hemagglutinin (HA) subtypes of influenza A viruses, only the H5 and H7 subtypes cause highly pathogenic (HP) influenza in the natural hosts. Several duck species are naturally resistant to HP Asian H5N1 influenza viruses. These duck species can shed and s...
This paper is to present a security-related motivation for compiler veriication, and in particular for binary compiler implementation veriication. We will prove that source level veriication is not suu-cient in order to guarantee compiler correctness. For this, we will adopt the scenario of a well-known attack to Unix operating system programs due to intruded Trojan Horses in compiler executabl...
With the growth and globalization of IC design development, there is an increase in number Designers Design houses. As setting up a fabrication facility may easily cost upwards $20 billion, costs for advanced nodes be even greater. houses that cannot produce their chips in-house have no option but to use external foundries are often other countries. Establishing trust with these can challenge, ...
Using mobile phones to access healthcare data is an upcoming application scenario of increasing importance in the near future. However, important aspects to consider in this context are the high security and privacy requirements for sensitive medical data. Current mobile phones using standard operating systems and software cannot offer appropriate protection for sensitive data, although the har...
This paper presents a unified formal framework for integrated circuits (IC) Trojan detection that can simultaneously employ multiple noninvasive measurement types. Hardware Trojans refer to modifications, alterations, or insertions to the original IC for adversarial purposes. The new framework formally defines the IC Trojan detection for each measurement type as an optimization problem and disc...
Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during postmanufacturing test has been shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures against hardware Trojans by either preventing Tr...
We propose a Hardware Trojan (HT) attack in wireless Integrated Circuits (ICs) that aims at leaking sensitive information within legitimate transmission. The HT is hidden inside the transmitter modulating into preamble of each transmitted frame which used for synchronization with receiver. data leakage does not affect and imperceptible by inconspicuous nominal receiver as it incur any performan...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید