Hardware Trojan

Results: 29



#Item
21Materials science / Sensors / Semiconductor devices / Mechanical engineering / Microelectromechanical systems / Wireless sensor network / Hardware Trojan / Integrated circuit / Tamper resistance / Technology / Transducers / Microtechnology

Shielding and Securing Integrated Circuits with Sensors Davood Shahrjerdi† , Jeyavijayan Rajendran† , Siddharth Garg† , Farinaz Koushanfar‡ , and Ramesh Karri† †Electrical and Computer Engineering Department,

Add to Reading List

Source URL: aceslab.org

Language: English - Date: 2014-10-31 10:49:26
22Hardware verification languages / Logic design / Formal methods / Logic in computer science / Hardware Trojan / Property Specification Language / Runtime verification / SystemVerilog / Functional verification / Electronic engineering / Digital electronics / Hardware description languages

Security Checkers: Detecting Processor Malicious Inclusions at Runtime Michael Bilzor, Ted Huffmire, Cynthia Irvine, and Tim Levin U.S. Naval Postgraduate School Abstract—To counter the growing threat of malicious sub

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2012-10-30 13:43:14
23Microprocessors / Integrated circuits / Parallel computing / Actor model / Concurrent computing / Secure multi-party computation / Hardware Trojan / Multi-core processor / Three-dimensional integrated circuit / Electronic engineering / Electronics / Computing

Hardware Trust Implications of 3-D Integration Ted Huffmire, Timothy Levin, Michael Bilzor, and Cynthia E. Irvine Department of Computer Science Naval Postgraduate School Monterey, CA 93943

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2010-11-15 16:22:59
24Electronic design automation / Hardware Trojan / Tutorial / Test compression / Joint Test Action Group / Advantest / Electronic engineering / Electronics / Electromagnetism

Intro At-a-Glance Tutorials Exhibits Plenary Events Technical

Add to Reading List

Source URL: www.itctestweek.org

Language: English - Date: 2014-10-14 00:41:49
25Spyware / National security / Security / Computer keyboard / Hardware keylogger / Anti keylogger / Trojan horses / Surveillance / Espionage / Keystroke logging

Profiles in Computing Eur Ing Sam Raincock Director, Information Security Consultant and Expert Witness Sam Raincock Consultancy Durham, UK http://www.raincock.co.uk

Add to Reading List

Source URL: trycomputing.org

Language: English - Date: 2012-09-19 14:24:50
26Electromagnetism / Integrated circuit / Electronic design automation / Semiconductor device fabrication / MOS Technology SID / Nintendo Entertainment System / Hardware Trojan / Design for testing / Electronic engineering / Electronic design / Electronics

Number 9 May 2011 Ensuring Hardware Cybersecurity John D. Villasenor

Add to Reading List

Source URL: www.brookings.edu

Language: English - Date: 2012-03-23 10:55:45
27Spyware / Computer network security / Computer security / Malware / Cryptography / Trusted computing base / Threat / Firmware / Backdoor / Cyberwarfare / Espionage / Security

Trojan hardware – some strategies and defenses Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/~mgk25/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-17 17:30:34
28Rogue software / Social engineering / Antivirus software / Computer network security / Computer virus / Spyware / Trojan horse / Email / Rogue security software / Malware / System software / Software

As you may already know, FAST RHINO provides a number of computer services to include virus & malware removal, traditional & wireless networks, data recovery and backup solutions, system sales and upgrades, hardware & so

Add to Reading List

Source URL: www.fastrhino.com

Language: English - Date: 2014-02-11 15:11:25
29Logic families / Digital electronics / Hardware Trojan / Integrated circuits / Hardware random number generator / CMOS / Entropy / Random number generation / CPU design / Electronic engineering / Randomness / Electronics

Stealthy Dopant-Level Hardware Trojans Georg T. Becker1 , Francesco Regazzoni2 , Christof Paar1,3 , and Wayne P. Burleson1

Add to Reading List

Source URL: people.umass.edu

Language: English - Date: 2013-06-07 14:54:03
UPDATE