نتایج جستجو برای: hardware trojan horses

تعداد نتایج: 123234  

2012
Xiaowei Wang

One of an operating system's duties is to provide a trustful security architecture to protect user information from threats coming from all aspects the information world. Trojan horses, viruses, and other threats are all aimed at users' personal information. Therefore, the concept of access control has been introduced to system security area years ago. Typically, it guaranties that only process...

Journal: :Nano letters 2007
Mi-Ran Choi Katie J Stanton-Maxey Jennifer K Stanley Carly S Levin Rizia Bardhan Demir Akin Sunil Badve Jennifer Sturgis J Paul Robinson Rashid Bashir Naomi J Halas Susan E Clare

Destruction of hypoxic regions within tumors, virtually inaccessible to cancer therapies, may well prevent malignant progression. The tumor's recruitment of monocytes into these regions may be exploited for nanoparticle-based delivery. Monocytes containing therapeutic nanoparticles could serve as "Trojan Horses" for nanoparticle transport into these tumor regions. Here we report the demonstrati...

Journal: :CoRR 2014
Reginald D. Smith

The development and evolution of malware including computer viruses, worms, and trojan horses, is shown to be closely analogous to the process of community succession long recognized in ecology. In particular, both changes in the overall environment by external disturbances, as well as, feedback effects from malware competition and antivirus coevolution have driven community succession and the ...

2010
Dongdong Du Seetharam Narasimhan Rajat Subhra Chakraborty Swarup Bhunia

Malicious modification of integrated circuits (ICs) in untrusted foundry, referred to as “Hardware Trojan”, has emerged as a serious security threat. While side-channel analysis has been reported as an effective approach to detect hardware Trojans, increasing process variations in nanoscale technologies pose a major challenge, since process noise can easily mask the Trojan effect on a measured ...

2012
Thomas Zink

Viruses, Worms and Trojan Horses, the malware zoo is growing every day. Hackers and Crackers try to penetrate computer systems, either for fun or for commercial benefit. Zombie-like creatures called Bots attack in the 10’s of thousands. Computer intrusions cause monetary as well as prestige losses. Countermeasures surely have to be taken, so a look on current technology and future outlines seem...

2010
Jean-François Gallais Johann Großschädl Neil Hanley Markus Kasper Marcel Medwed Francesco Regazzoni Jörn-Marc Schmidt Stefan Tillich Marcin Wójcik

Malicious alterations of integrated circuits (ICs), introduced during either the design or fabrication process, are increasingly perceived as a serious concern by the global semiconductor industry. Such rogue alterations often take the form of a “hardware Trojan,” which may be activated from remote after the compromised chip or system has been deployed in the field. The devious actions of hardw...

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Hans Hüttel Morten Kühnrich

This paper presents a type system for the calculus of Mobile Resources (MR) proposed by Godskesen et al. The type system is able to prevent undesirable bordercrossing behaviour such as Trojan horses. This is achieved by combining the notion of group with a notion of security policy. Well-typed processes satisfy a safety property which is preserved under reduction. An algorithm is presented whic...

2014
Stanislav Ponomarev Nathan Wallace Travis Atkison

Research efforts to develop malicious application detection algorithms have been a priority ever since the discovery of the first “viruses”. Fourier transform is used to extract features from binary files. These features are then reduced by random projection algorithm to create a set of low-dimensional features that are used to classify whether the application is malicious or not. A 99.6% accur...

2017
Anirban Sengupta Saraju P. Mohanty

Owing to massive complexity of modern digital integrated circuits (ICs) disabling complete inhouse development, globalization of the design process establishes itself as an inevitable solution for faster and efficient design. However, globalization incurs importing intellectual property (IP) cores from various third party (3P) vendors, rendering an IP susceptible to hardware threats. To provide...

Journal: :IEEE Transactions on Computers 2023

In the fourth industrial revolution, securing protection of supply chains has become an ever-growing concern. One such cyber threat is a hardware Trojan (HT), malicious modification to IC. HTs are often identified during manufacturing process but should be removed earlier in design process. Machine learning-based HT detection gate-level netlists efficient approach identifying at early stage. Ho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید