Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trojan horses
biblio
A Co-Training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Integrated circuit modeling
unlabeled ICs
unlabeled IC
unlabeled fabricated IC
Trojan horses
trojan horse detection
Training
simulated IC
Silicon
reliable detection capability
pubcrawl
pattern classification
learning (artificial intelligence)
invasive software
accurate classification model
inaccurate simulation models
IC labeling
hardware Trojan detection
Hardware Security
Hardware
golden chip
fabrication
fabricated golden chips
co-training based hardware Trojan detection technique
co-training
classification-based golden chips-free hardware Trojan detection technique
Classification algorithms
actual silicon fabrication
biblio
A Neural Network Trojan Detection Method Based on Particle Swarm Optimization
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
particle swarm optimization
Trojan horses
trojan horse detection
Side Channel Analysis technology
RTL circuits
pubcrawl
PSO NN method
Principal Component Analysis algorithm
principal component analysis
Power demand
power consumption data
power consumption
power aware computing
Artificial Neural Networks
particle swarm optimisation
neural network Trojan detection
neural nets
malicious modifications
invasive software
intelligent neural networks algorithm
Integrated circuit modeling
HSPICE power consumption simulation
hardware Trojan detection
Hardware
Cryptography
biblio
Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
novel clustering ensemble method
untrustworthy testing party
untrustworthy testing parties
Unsupervised Learning
trusted hardware Trojan detection framework
Trusted Computing
Trojan horses
trojan horse detection
testing stage
testing
robust hardware Trojan detection framework
pubcrawl
pattern clustering
novel clustering ensemble technique
Clustering algorithms
invasive software
integrated circuit testing
Integrated circuit modeling
IC
hardware Trojan detection
Hardware Security
Hardware
golden models-free hardware Trojan detection framework
fabrication process
fabrication
existing hardware Trojan detection
clustering ensemble
biblio
Exploiting Phase Information in Thermal Scans for Stealthy Trojan Detection
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
modulation
weak thermal hot spots
Trojan horses
trojan horse detection
Trojan detection
thermal scans
Thermal Mapping
Temperature measurement
stealthy hardware Trojan detection
pubcrawl
Phase measurement
phase information
Phase
amplitude analysis
measurement platform
Lock-in Thermography
invasive software
integrated circuits
infrared thermography
infrared signals
infrared imaging
Heating systems
Hardware
formidable alternative
detection method
biblio
A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation
Submitted by grigby1 on Fri, 03/15/2019 - 11:58am
invasive software
Tunneling magnetoresistance
Trojan horses
trojan horse detection
Thwart Hardware Trojan insertion
Sensitivity
security of data
pubcrawl
prevention methods
original circuit
novel prevention technique
malicious modifications
logic circuits
ad-hoc design rules
integrated circuits
integrated circuit industry
Hardware Trojans
hardware trojan
Hardware
fabricated IC
error detection
critical circuits
Circuit faults
approximation
approximate logic circuit
biblio
Designing Subspecies of Hardware Trojans and Their Detection Using Neural Network Approach
Submitted by grigby1 on Fri, 03/15/2019 - 11:58am
learning (artificial intelligence)
true positive rate
Trojan horses
trojan horse detection
trigger circuits
TPR
third-party vendors
pubcrawl
outsourcing
neural-network based hardware-Trojan detection method
neural network approach
neural network
neural nets
machine-learning-based hardware-Trojan detection method
machine learning
Logic gates
Artificial Neural Networks
invasive software
integrated circuit design
high-performance hardware device
hardware trojan subspecies designing
hardware trojan
hardware devices mass-production
Hardware
gradient methods
gate-level netlist
feature extraction
electronic engineering computing
electric devices
Design Time
Benchmark testing
biblio
Grey Zone in Pre-Silicon Hardware Trojan Detection
Submitted by grigby1 on Fri, 03/15/2019 - 11:58am
invasive software
Trust-Hub
Trojan horses
trojan horse detection
Silicon
Si
pubcrawl
probability
pre-silicon hardware trojan detection method
Pre-Silicon Hardware Trojan Detection
machine learning
low signal probability
learning (artificial intelligence)
activation probability
integrated circuit testing
integrated circuit design
hardware Trojan benchmark circuits
Hardware
grey zone
functional test
elemental semiconductors
electronic engineering computing
benchmark
behaviour simulations
Behaviour Simulation
biblio
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
Submitted by aekwall on Mon, 03/04/2019 - 10:48am
Entropy
Automated Response Actions
Trojan horses
timely defense decision making
Text Mining
Stanford typed dependency parser
rapid growth
publicly available CTI sources
NLP techniques
NLP
Mutual information
Malware behavior analysis
low-level cyber threat actions
information theory
extract threat actions
security of data
enabling timely response
cybersecurity texts
cyber threat intelligence sharing
cyber threat intelligence
Cyber Attacks
advance threat notice
ActionMiner
natural language processing
Data mining
Decision Making
Cybersecurity
composability
pubcrawl
Resiliency
biblio
Improving Power amp; Latency Metrics for Hardware Trojan Detection During High Level Synthesis
Submitted by grigby1 on Mon, 12/10/2018 - 11:42am
Mathematical model
work factor metrics
Unroll Factor
Trojan horses
third party IP cores
Space exploration
semiconductor industry
secure IC design process
Scalability
resource allocation
Resiliency
resilience
pubcrawl
power metrics
power consumption
microprocessor chips
adders
latency metrics
invasive software
integrated circuits
integrated circuit design
integrated chip design
high level synthesis
hardware Trojan detection
hardware trojan
Hardware
design-for-trust techniques
design space exploration process
Design Space Exploration
datapath resource allocation
cuckoo search algorithm
Benchmark testing
biblio
INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network
Submitted by grigby1 on Fri, 10/26/2018 - 4:53pm
INFECT
wireless openaccess research platform
wireless LAN
Trojan horses
Signal to noise ratio
security
Scalability
Robustness
Resiliency
radio transmitters
radio receivers
radio networks
pubcrawl
802.11a/g transmitter
inconspicuous FEC-based trojan
hardware attack
forward error correction
FEC encoding
Decoding
Contamination
channel noise profiling
channel noise
channel coding
Binary phase shift keying
802.11a/g wireless network
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »