نتایج جستجو برای: hardware Trojan horses

تعداد نتایج: 123234  

A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...

Journal: :Journal of Systems Architecture 2022

Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also industry because of the dramatic complexity and dangerousness attackers can count on. It has been shown that HTHs be inserted in modern complex microprocessors allowing attacker to run malicious software, acquire root privileges steal secret user information. In this paper we propose DETON, an automatic ...

2010
Daniel Fuentes Juan Antonio Álvarez Juan Antonio Ortega Luis González Abril Francisco Velasco Morente

Mobile phones and wireless technology and its constant evolution have, in the last years, revolutionized the way in which we communicate and work. However, one of the main barriers encounter in the use of these technologies is data security. Trojan horses are dangerous software to attack phones, PDAs and Smartphones. New versions are created everyday to attack the functionality, theft the store...

Journal: :Journal of Family Planning and Reproductive Health Care 2007

Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...

2017
Samer Moein Fayez Gebali Aaron Gulliver Abdulrahman Alkandari

The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...

1999
Urs E. Gattiker Pia Pedersen Karsten Petersen Sarah Gordon

This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It explores the type and scope of threats encountered on the Internet throughout history until today. It examines user attitudes and considers ways in which those attitudes can actively affect your organization’s vulnerability to Trojanizations of various types. It discusses ...

Journal: :CoRR 2010
Tatini Mal-Sarkar Swarup Bhunia

With increasing complexity of modern-day mobile devices, security of these devices in presence of myriad attacks by an intelligent adversary is becoming a major issue. The vast majority of cell phones still remain unsecured from many existing and emerging security threats [1]. There are two major modes of threats for mobile wireless devices hardware and software. In the hardware field, many thr...

Journal: :IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2012

2015
John Shield Bradley D. Hopkins Mark R. Beaumont Chris J. North

Hardware trojans are a systemic threat that can impact the operations and infrastructure of corporations and government organisations. In this paper, we evaluate a credible and organisation-wide hardware trojan threat from compromised network cards. Our research examines the systemic threat of hardware trojans with an actual hardware trojan implementation to evaluate the impact. Our hardware tr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید