Heterogenous ensemble learning driven multi-parametric assessment model for hardware Trojan detection
T Lavanya, K Rajalakshmi - Integration, 2023 - Elsevier
Semiconductor technologies have gained wide-spread attention across industries due to its
use in varied digital signal processing units, healthcare-devices, industrial communication …
use in varied digital signal processing units, healthcare-devices, industrial communication …
DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans
The global semiconductor supply chain involves design and fabrication at various locations,
which leads to multiple security vulnerabilities, eg, Hardware Trojan (HT) insertion. Although …
which leads to multiple security vulnerabilities, eg, Hardware Trojan (HT) insertion. Although …
[PDF][PDF] RTL 级硬件木马问题研究
赵剑锋, 史岗 - Journal of Cyber Security 信息安全学报, 2023 - 159.226.95.92
摘要信息时代使得信息安全变得日益重要. 信息安全可以分为两类: 软件安全和硬件安全.
攻击方为了获取想要的信息, 除了使用软件方面的手段, 如病毒, 蠕虫, 软件木马等 …
攻击方为了获取想要的信息, 除了使用软件方面的手段, 如病毒, 蠕虫, 软件木马等 …
Machine Learning–Based Hardware Trojans Detection in Integrated Circuits: A Systematic Review
R Sharma, P Ranjan - International Conference on Data Science and …, 2023 - Springer
A purposefully inserted additional circuit known as the Hardware Trojan (HT) is implanted
inside original integrated circuits during the designing or manufacturing stages. It has the …
inside original integrated circuits during the designing or manufacturing stages. It has the …
A Qualitative Study That Explores the Implementation of Artificial Intelligence in Integrated Circuit Design
D Rittman - 2023 - search.proquest.com
The development of data processing technology relies heavily on integrated circuits (ICs),
which are electronic components that perform various tasks, including complex …
which are electronic components that perform various tasks, including complex …
[图书][B] Investigation into detection of hardware trojans on printed circuit boards
G Piliposyan - 2023 - search.proquest.com
The modern semiconductor device manufacturing flow is becoming increasingly vulnerable
to malicious implants called Hardware Trojans (HT). With HTs becoming stealthier a need …
to malicious implants called Hardware Trojans (HT). With HTs becoming stealthier a need …
Comparative Analysis of Multiresolution Features Through Power Side-Channel Signals for Hardware Trojan Detection
SJ Pungati, B Dhakale, S Kadam, A Bhurane… - Available at SSRN … - papers.ssrn.com
Abstract Hardware Trojans (HTs) has become a significant security concern for integrated
circuits (IC) as they can be used to compromise the functionality and confidentiality of the …
circuits (IC) as they can be used to compromise the functionality and confidentiality of the …