For immediate assistance browse through our support center. You can find answers to many questions in just a few minutes.
If still experiencing problems, send us a report.
A Survey of Hardware Trojan Taxonomy and Detection
Ranking is calculated from a formula comprised of user reviews and usage data. Learn more ›
10 Jun 2010 | Publications | Contributor(s): Mohammad Tehranipoor
Editor's note: Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. This article presents a …
Hardware Trojan: Threats and Emerging Solutions
25 Aug 2010 | Publications | Contributor(s): Seetharam Narasimhan, Swarup Bhunia
Malicious modification of hardware during design or fabrication has emerged as a major security concern. Such tampering (also referred to as Hardware Trojan) causes an integrated circuit (IC) to have …
Multiple-Parameter Side-Channel Analysis: A Non-Invasive Hardware Trojan Detection Approach
Malicious alterations of integrated circuits during fabrication in untrusted foundries pose major concern in terms of their reliable and trusted field operation. It is extremely difficult to discover …
Self-Referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection
27 Aug 2010 | Publications | Contributor(s): Seetharam Narasimhan, Swarup Bhunia
Malicious modification of integrated circuits (ICs) in un- trusted foundry, referred to as "Hardware Trojan", has emerged as a serious security threat. While side-channel analysis has been reported …
DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements
30 Aug 2011 | News Items | Contributor(s): Hassan Salmani
Detecting Trojans in an integrated circuit (IC) is an important but hard problem. A Trojan is malicious hardware—it can be extremely small in size and dormant until triggered by some unknown …
Total 5 results found. | See more results
May 30 2013
Hardware security is becoming increasingly important for many embedded systems ranging from small RFID tag to satellites orbiting the earth. While secure applications such as public services, …
Total 1 results found.