نتایج جستجو برای: hardware trojan horses

تعداد نتایج: 123234  

1996
J. D. Tygar Alma Whitten

World Wide Web electronic commerce applications often require consumers to enter private informa tion such as credit card numbers into forms in the browser window If third parties can insert trojan horse applications onto a consumer s machine they can monitor keyboard strokes and steal private infor mation This paper outlines a simple way to accomplish this using Java or similar remote executio...

2009
Jeong‐Ki Kim Nicholas J. Negovetich Heather L. Forrest Robert G. Webster

Wild ducks are the main reservoir of influenza A viruses that can be transmitted to domestic poultry and mammals, including humans. Of the 16 hemagglutinin (HA) subtypes of influenza A viruses, only the H5 and H7 subtypes cause highly pathogenic (HP) influenza in the natural hosts. Several duck species are naturally resistant to HP Asian H5N1 influenza viruses. These duck species can shed and s...

1999
Wolfgang Goerigk

This paper is to present a security-related motivation for compiler veriication, and in particular for binary compiler implementation veriication. We will prove that source level veriication is not suu-cient in order to guarantee compiler correctness. For this, we will adopt the scenario of a well-known attack to Unix operating system programs due to intruded Trojan Horses in compiler executabl...

Journal: :International Journal of Electrical and Computer Engineering (IJECE) 2019

Journal: :ACM Transactions in Embedded Computing Systems 2023

With the growth and globalization of IC design development, there is an increase in number Designers Design houses. As setting up a fabrication facility may easily cost upwards $20 billion, costs for advanced nodes be even greater. houses that cannot produce their chips in-house have no option but to use external foundries are often other countries. Establishing trust with these can challenge, ...

2011
Alexandra Dmitrienko Zecir Hadzic Hans Löhr Marcel Winandy Ahmad-Reza Sadeghi

Using mobile phones to access healthcare data is an upcoming application scenario of increasing importance in the near future. However, important aspects to consider in this context are the high security and privacy requirements for sensitive medical data. Current mobile phones using standard operating systems and software cannot offer appropriate protection for sensitive data, although the har...

2010
Farinaz Koushanfar Azalia Mirhoseini Yousra Alkabani

This paper presents a unified formal framework for integrated circuits (IC) Trojan detection that can simultaneously employ multiple noninvasive measurement types. Hardware Trojans refer to modifications, alterations, or insertions to the original IC for adversarial purposes. The new framework formally defines the IC Trojan detection for each measurement type as an optimization problem and disc...

Journal: :J. Electronic Testing 2011
Rajat Subhra Chakraborty Swarup Bhunia

Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during postmanufacturing test has been shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures against hardware Trojans by either preventing Tr...

Journal: :IEEE Transactions on Dependable and Secure Computing 2022

We propose a Hardware Trojan (HT) attack in wireless Integrated Circuits (ICs) that aims at leaking sensitive information within legitimate transmission. The HT is hidden inside the transmitter modulating into preamble of each transmitted frame which used for synchronization with receiver. data leakage does not affect and imperceptible by inconspicuous nominal receiver as it incur any performan...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید