搜索结果: 1-8 共查到“军队指挥学 hardware Trojan”相关记录8条 . 查询时间(0.078 秒)
The First Thorough Side-Channel Hardware Trojan
side-channel analysis threshold implementation hardware Trojan
font style='font-size:12px;'>
2017/9/14
Hardware Trojans have gained high attention in academia, industry and by government agencies. The effective detection mechanisms and countermeasures against such malicious designs are only possible wh...
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse
Hardware Trojan Horse LCMQ Safe Error
font style='font-size:12px;'>
2016/12/26
Radio-Frequency Identification tags are used for several applications requiring authentication mechanisms, which if subverted can lead to dire consequences. Many of these devices are based on low-cost...
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
hardware trojan horses secure multiparty computations
font style='font-size:12px;'>
2016/12/8
Security against hardware trojans is currently becoming an essential ingredient to ensure trust in information systems. A variety of solutions have been introduced to reach this goal, ranging from rea...
Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability
Hardware Trojans Genetic Algorithm Boolean Satisfiability
font style='font-size:12px;'>
2016/1/26
Test generation for Hardware Trojan Horses (HTH) detection
is extremely challenging, as Trojans are designed to be triggered by
very rare logic conditions at internal nodes of the circuit. In this p...
Hardware Trojan Horses in Cryptographic IP Cores
Hardware Trojan Horses Cryptographic IP Cores
font style='font-size:12px;'>
2016/1/7
Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The context is th...
HaTCh: A Formal Framework of Hardware Trojan Design and Detection
Hardware Trojans Security IP Cores
font style='font-size:12px;'>
2016/1/5
Electronic Design Automation (EDA) industry heavily reuses existing design blocks called
IP cores. These IP cores are vulnerable to insertion of Hardware Trojans (HTs) at design time
by third party ...
Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
AES block ciphers hardware Trojan
font style='font-size:12px;'>
2015/12/24
As part of the revelations about the NSA activities,
the notion of interdiction has become known to the public:
the interception of deliveries to manipulate hardware in a way
that backdoors are int...
Extraction of intrinsic structure for Hardware Trojan detection
implementation hardware trojan detection
font style='font-size:12px;'>
2015/12/23
In this paper we present a novel solution to address the problem of
potential malicious circuitry on FPGA. This method is based on an a
technique of structure extraction which consider the infection...