نتایج جستجو برای: hardware trojan horses

تعداد نتایج: 123234  

Journal: :DEStech Transactions on Computer Science and Engineering 2017

Journal: :IEEE Transactions on Vehicular Technology 2017

Journal: :Buildings 2022

Investment projects are not the only ones where significant complications in their implementation may occur. The fundamental question, how to specify threats hidden time series, is one of most important types knowledge arising from basic schedules’ documentation. Feasibility studies, project proposals, organizational and production procedures, research projects, others major resources informati...

2009
Rajat Subhra Chakraborty Francis G. Wolff Somnath Paul Christos A. Papachristou Swarup Bhunia

In order to ensure trusted in–field operation of integrated circuits, it is important to develop efficient low–cost techniques to detect malicious tampering (also referred to as Hardware Trojan) that causes undesired change in functional behavior. Conventional post–manufacturing testing, test generation algorithms and test coverage metrics cannot be readily extended to hardware Trojan detection...

Journal: :Journal of Systems Architecture 2022

Software exploitable Hardware Trojan Horses (HTHs) inserted into commercial CPUs allow the attacker to run his/her own software or gain unauthorized privileges. Recently a novel menace raised: HTHs by CAD tools. A consequence of such scenario is that must be considered serious threat not only academy but also industry. In this paper we try answer following question: can Machine Learning (ML) he...

Journal: :Computers & Security 1995
Raymond W. Lo Karl N. Levitt Ronald A. Olsson

The goal of this research is to develop a method to detect malicious code (e.g. computer viruses, worms, Trojan horses, and time/logic bombs) and security-related vulnerabilities in system programs. The Malicious Code Filter (MCF) is a programmable static analysis tool developed for this purpose. It allows the examination of a program before installation, thereby avoiding damage a malicious pro...

Journal: :Computer Communications 1996
Sokratis K. Katsikas Thomas Spyrou Dimitris Gritzalis John Darzentas

Computer viruses, worms and Trojan horses pose the most severe intrusion threat against an automated environment, especially if this environment is distributed and the ability to enforce physical access control is very limited. These structures are also collectively referred to as malicious software. In this paper, a model for viral attacks against computer networks is being developed. The soun...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید