نتایج جستجو برای: hardware trojan horses
تعداد نتایج: 123234 فیلتر نتایج به سال:
One of an operating system's duties is to provide a trustful security architecture to protect user information from threats coming from all aspects the information world. Trojan horses, viruses, and other threats are all aimed at users' personal information. Therefore, the concept of access control has been introduced to system security area years ago. Typically, it guaranties that only process...
Destruction of hypoxic regions within tumors, virtually inaccessible to cancer therapies, may well prevent malignant progression. The tumor's recruitment of monocytes into these regions may be exploited for nanoparticle-based delivery. Monocytes containing therapeutic nanoparticles could serve as "Trojan Horses" for nanoparticle transport into these tumor regions. Here we report the demonstrati...
The development and evolution of malware including computer viruses, worms, and trojan horses, is shown to be closely analogous to the process of community succession long recognized in ecology. In particular, both changes in the overall environment by external disturbances, as well as, feedback effects from malware competition and antivirus coevolution have driven community succession and the ...
Malicious modification of integrated circuits (ICs) in untrusted foundry, referred to as “Hardware Trojan”, has emerged as a serious security threat. While side-channel analysis has been reported as an effective approach to detect hardware Trojans, increasing process variations in nanoscale technologies pose a major challenge, since process noise can easily mask the Trojan effect on a measured ...
Viruses, Worms and Trojan Horses, the malware zoo is growing every day. Hackers and Crackers try to penetrate computer systems, either for fun or for commercial benefit. Zombie-like creatures called Bots attack in the 10’s of thousands. Computer intrusions cause monetary as well as prestige losses. Countermeasures surely have to be taken, so a look on current technology and future outlines seem...
Malicious alterations of integrated circuits (ICs), introduced during either the design or fabrication process, are increasingly perceived as a serious concern by the global semiconductor industry. Such rogue alterations often take the form of a “hardware Trojan,” which may be activated from remote after the compromised chip or system has been deployed in the field. The devious actions of hardw...
This paper presents a type system for the calculus of Mobile Resources (MR) proposed by Godskesen et al. The type system is able to prevent undesirable bordercrossing behaviour such as Trojan horses. This is achieved by combining the notion of group with a notion of security policy. Well-typed processes satisfy a safety property which is preserved under reduction. An algorithm is presented whic...
Research efforts to develop malicious application detection algorithms have been a priority ever since the discovery of the first “viruses”. Fourier transform is used to extract features from binary files. These features are then reduced by random projection algorithm to create a set of low-dimensional features that are used to classify whether the application is malicious or not. A 99.6% accur...
Owing to massive complexity of modern digital integrated circuits (ICs) disabling complete inhouse development, globalization of the design process establishes itself as an inevitable solution for faster and efficient design. However, globalization incurs importing intellectual property (IP) cores from various third party (3P) vendors, rendering an IP susceptible to hardware threats. To provide...
In the fourth industrial revolution, securing protection of supply chains has become an ever-growing concern. One such cyber threat is a hardware Trojan (HT), malicious modification to IC. HTs are often identified during manufacturing process but should be removed earlier in design process. Machine learning-based HT detection gate-level netlists efficient approach identifying at early stage. Ho...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید