Hardware Trojan

Results: 29



#Item
1Cryptography / Computer security / Computer hardware / Hardware security module / Hardware security / Tamper resistance

Trojan-tolerant Hardware + Supply Chain Security in Practice Vasilios Mavroudis

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
2

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification Stefan Dziembowski? , Sebastian Faust?? , and Fran¸cois-Xavier Standaert? ? ? 1 University of Warsaw

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-10-22 11:32:15
    3Semiconductor devices / Electronic design / Hardware Trojan / Trojans / Electronic engineering / Field-programmable gate array / Integrated circuit / Cryptographic engineering / Trojan horse / Hardware obfuscation

    SALWARE: Salutary Hardware to design Trusted IC Lilian Bossuet1, David Hely2 1 2

    Add to Reading List

    Source URL: www.univ-st-etienne.fr

    Language: English - Date: 2016-04-04 04:42:13
    4Integrated circuits / Automatic test pattern generation / Linear-feedback shift register / Built-in self-test / Scan chain / Hardware Trojan

    Low Power MSIC Signatures for Effective BIST Design Chekka Narasimha Rao M.Tech Student, Audi Sankara Institute of Technology, NH-5 Bypass Road, East Gudur Rural, Andrapradesh

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-01-10 06:34:49
    5Electronics manufacturing / Education / Tutorial / JTAG / Hardware Trojan / IEEE Computer Society

    Intro At-a-Glance Tutorials Exhibits Plenary & Keynotes Technical

    Add to Reading List

    Source URL: www.itctestweek.org

    Language: English - Date: 2015-09-30 00:55:05
    6Electronic engineering / Electromagnetism / Electronics / Integrated circuits / Electronic design automation / Electronic design / Semiconductor device fabrication / Hardware Trojan / Automatic test pattern generation / Electromigration / Reliability engineering / Negative-bias temperature instability

    Copyright © 2012 American Scientific Publishers All rights reserved Printed in the United States of America Journal of Low Power Electronics

    Add to Reading List

    Source URL: euler.ecs.umass.edu

    Language: English - Date: 2012-11-06 11:44:32
    7

    Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability

    Add to Reading List

    Source URL: www.cryptoexperts.com

    Language: English - Date: 2015-11-13 04:48:41
      8Computer security / Hardware Trojan / Field-programmable gate array / Physical Unclonable Function / Cyberwarfare / Security / Fault injection / Software testing

      www.cost.eu/ict COST Action no. IC1204 2012⏐2016

      Add to Reading List

      Source URL: w3.cost.eu

      Language: English - Date: 2013-05-30 08:33:11
      9Physical Unclonable Function / Randomness / Elliptic curve cryptography / Side channel attack / PUF / LEX / Hardware Trojan / Digital rights management / Joint Test Action Group / Cryptography / Advanced Encryption Standard / Trojan horses

      HOST-2010 3rd Annual IEEE International Symposium on Hardware-Oriented Security and Trust June 13-14, 2010 – Anaheim Convention Center, Anaheim, CA Sunday, June 13th

      Add to Reading List

      Source URL: www.engr.uconn.edu

      Language: English - Date: 2010-10-16 10:23:01
      10Security / Hardware Trojan / Physical Unclonable Function / Side channel attack / Computer security / Power analysis / Threat / Cryptography / Cyberwarfare / Computer network security

      ODETTE: A Non-Scan Design-for-Test Methodology for Trojan Detection in ICs M. Banga and M. Hsiao (Virginia Tech) 11:45 - 1:00: Lunch 1:00 - 2:00: Poster Session Session Chair: Patrick Schaumont

      Add to Reading List

      Source URL: www.engr.uconn.edu

      Language: English - Date: 2011-05-27 10:02:27
      UPDATE