HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart Trojan Attacks in COTS Processor
Commercial-off-the-shelf (COTS) components are often preferred over custom Integrated
Circuits (ICs) to achieve reduced system development time and cost, easy adoption of new …
Circuits (ICs) to achieve reduced system development time and cost, easy adoption of new …
A neural network framework based on ConvNeXt for side‐channel hardware Trojan detection
Y Gao, J Su, J Li, S Wang, C Li - ETRI Journal, 2024 - Wiley Online Library
Researchers in the field of hardware security have been dedicated to the study of hardware
Trojan detection. Among the various approaches, side‐channel detection methods are …
Trojan detection. Among the various approaches, side‐channel detection methods are …
A Multiobjective Approach for Side-Channel Based Hardware Trojan Detection Using Power Traces
P Mohanraj, S Paramasivam - IEICE Transactions on …, 2024 - search.ieice.org
The detection of hardware trojans has been extensively studied in the past. In this article, we
propose a side-channel analysis technique that uses a wrapper-based feature selection …
propose a side-channel analysis technique that uses a wrapper-based feature selection …
Instruction prefetch based power control
M Houston, RK Albright, B Goska, S Ganju… - US Patent …, 2024 - Google Patents
Abstract Systems and methods herein address power for one or more processing units,
using one of a plurality of power profiles during execution of a group of real-time instructions …
using one of a plurality of power profiles during execution of a group of real-time instructions …