Articles with "hardware trojan" as a keyword



Photo by framesforyourheart from unsplash

Hardware trojan enabled denial of service attack on CAN bus

Sign Up to like & get
recommendations!
Published in 2018 at "Procedia Manufacturing"

DOI: 10.1016/j.promfg.2018.10.158

Abstract: Abstract The trend of technological advances in the vehicle industry illustrates that future cars would have added functionalities with smart features, better connectivity and autonomous behaviour. These naturally involve a higher number of Electronic Control… read more here.

Keywords: hardware trojan; attack; trojan enabled; hardware ... See more keywords
Photo by isword from unsplash

A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2965016

Abstract: The remarkable success of machine learning (ML) in a variety of research domains has inspired academic and industrial communities to explore its potential to address hardware Trojan (HT) attacks. While numerous works have been published… read more here.

Keywords: hardware; hardware trojan; trojan attacks; machine learning ... See more keywords
Photo by isword from unsplash

Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3168991

Abstract: The integrated circuit (IC) ecosystem, today, is widely distributed. Usually, a handful of companies is involved in the development of a single chip – an environment that presents many opportunities for malicious activities such as… read more here.

Keywords: hardware ransomware; ransomware attack; hardware; attack ... See more keywords
Photo from wikipedia

Hyperspectral Image Recovery via Reliability-Weighted Compressed Sensing for Hardware Trojan Detection

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3205323

Abstract: Hyperspectral imaging is a popular style of image acquisition which captures a multitude of two-dimensional images at different frequencies to yield more information from a scene. For imaging in certain frequency ranges, point-scanning images pixel-by-pixel… read more here.

Keywords: hardware trojan; hyperspectral image; compressed sensing; image ... See more keywords
Photo by framesforyourheart from unsplash

A General Framework for Hardware Trojan Detection in Digital Circuits by Statistical Learning Algorithms

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2016.2638442

Abstract: The continuous globalization of the semiconductor industry has significantly raised the vulnerability of chips under hardware Trojan (HT) attacks. It is extremely challenging to detect HTs in fabricated chips due to the existence of process… read more here.

Keywords: hardware trojan; framework hardware; detection; framework ... See more keywords
Photo from wikipedia

Hardware Trojan Detection on a PCB Through Differential Power Monitoring

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Emerging Topics in Computing"

DOI: 10.1109/tetc.2020.3035521

Abstract: There is a general consensus that contemporary electronics are at risk of cyber-attacks or malicious modifications, such as Hardware Trojans (HT). This makes it crucial to develop reliable countermeasures at both Integrated Circuit (IC) and… read more here.

Keywords: methodology; pcb; power; detection ... See more keywords
Photo by framesforyourheart from unsplash

Golden-Chip-Free Hardware Trojan Detection Through Quiescent Thermal Maps

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"

DOI: 10.1109/tvlsi.2019.2933441

Abstract: Hardware trojan (HT) is increasingly becoming a major threat in the integrated circuit (IC) industry. Among all the countermeasures, academia is currently paying their most attention to the side-channel ones. However, most of the existing… read more here.

Keywords: quiescent thermal; thermal maps; hardware trojan; chip ... See more keywords
Photo from wikipedia

A Pre-Activation, Golden IC Free, Hardware Trojan Detection Approach

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"

DOI: 10.1109/tvlsi.2021.3138303

Abstract: The increasing concern about the security and reliability of abroad manufactured integrated circuits (ICs) has attracted academia and industries to develop hardware Trojan (HT) detection approaches. This article presents an efficient integrated HT detection technique… read more here.

Keywords: circuit; detection; method; hardware trojan ... See more keywords
Photo from wikipedia

Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs

Sign Up to like & get
recommendations!
Published in 2021 at "PLoS ONE"

DOI: 10.1371/journal.pone.0254903

Abstract: Due to Hardware Trojan (HT), trustworthiness of Integrated Circuit (IC) supply chain is a burning issue in Semiconductor Industry nowadays. Over the last decade, extensive research has been carried on HT detection methods for digital… read more here.

Keywords: hardware trojan; detection; ofdm based; cryptographic ics ... See more keywords
Photo by framesforyourheart from unsplash

Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)

Sign Up to like & get
recommendations!
Published in 2023 at "Micromachines"

DOI: 10.3390/mi14040828

Abstract: Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been… read more here.

Keywords: hardware; hardware trojan; network chip; chip ... See more keywords