搜索结果: 1-8 共查到“军队指挥学 Hardware Trojan”相关记录8条 . 查询时间(0.078 秒)
The First Thorough Side-Channel Hardware Trojan
side-channel analysis threshold implementation hardware Trojan
2017/9/14
Hardware Trojans have gained high attention in academia, industry and by government agencies. The effective detection mechanisms and countermeasures against such malicious designs are only possible wh...
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse
Hardware Trojan Horse LCMQ Safe Error
2016/12/26
Radio-Frequency Identification tags are used for several applications requiring authentication mechanisms, which if subverted can lead to dire consequences. Many of these devices are based on low-cost...
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
hardware trojan horses secure multiparty computations
2016/12/8
Security against hardware trojans is currently becoming an essential ingredient to ensure trust in information systems. A variety of solutions have been introduced to reach this goal, ranging from rea...
Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability
Hardware Trojans Genetic Algorithm Boolean Satisfiability
2016/1/26
Test generation for Hardware Trojan Horses (HTH) detection
is extremely challenging, as Trojans are designed to be triggered by
very rare logic conditions at internal nodes of the circuit. In this p...
Hardware Trojan Horses in Cryptographic IP Cores
Hardware Trojan Horses Cryptographic IP Cores
2016/1/7
Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The context is th...
HaTCh: A Formal Framework of Hardware Trojan Design and Detection
Hardware Trojans Security IP Cores
2016/1/5
Electronic Design Automation (EDA) industry heavily reuses existing design blocks called
IP cores. These IP cores are vulnerable to insertion of Hardware Trojans (HTs) at design time
by third party ...
Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
AES block ciphers hardware Trojan
2015/12/24
As part of the revelations about the NSA activities,
the notion of interdiction has become known to the public:
the interception of deliveries to manipulate hardware in a way
that backdoors are int...
Extraction of intrinsic structure for Hardware Trojan detection
implementation hardware trojan detection
2015/12/23
In this paper we present a novel solution to address the problem of
potential malicious circuitry on FPGA. This method is based on an a
technique of structure extraction which consider the infection...