Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trojan horse detection
biblio
Variation-Aware Hardware Trojan Detection through Power Side-Channel
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
integrated logic circuits
variation-aware hardware Trojan detection
Trojan-to-circuit power consumption
Trojan horses
trojan horse detection
side-channel analysis
Sensitivity
pubcrawl
process variation
power side-channel
Power demand
outsourcing
logic design
invasive software
Clock-tree Partition
integrated circuits
integrated circuit testing
HT detection sensitivity
HT activation chances
hardware trojan
Hardware
fine-grain circuit partitioning
Equal-power Partition
Detection sensitivity
Detectability
Cryptography
Clocks
biblio
Hardware Trojan Detection Using Path Delay Order Encoding with Process Variation Tolerance
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
Logic gates
variation-tolerant path delay order encoding technique
Trojan horses
trojan horse detection
security threats
security
pubcrawl
process variation tolerance
path delay information
outsourcing
delays
HT detection techniques
Hardware Trojans
hardware Trojan detection
Hardware
Foundries
fabrication
encoding
DfT
design-for-trust techniques
biblio
A Co-Training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
Integrated circuit modeling
unlabeled ICs
unlabeled IC
unlabeled fabricated IC
Trojan horses
trojan horse detection
Training
simulated IC
Silicon
reliable detection capability
pubcrawl
pattern classification
learning (artificial intelligence)
invasive software
accurate classification model
inaccurate simulation models
IC labeling
hardware Trojan detection
Hardware Security
Hardware
golden chip
fabrication
fabricated golden chips
co-training based hardware Trojan detection technique
co-training
classification-based golden chips-free hardware Trojan detection technique
Classification algorithms
actual silicon fabrication
biblio
A Neural Network Trojan Detection Method Based on Particle Swarm Optimization
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
particle swarm optimization
Trojan horses
trojan horse detection
Side Channel Analysis technology
RTL circuits
pubcrawl
PSO NN method
Principal Component Analysis algorithm
principal component analysis
Power demand
power consumption data
power consumption
power aware computing
Artificial Neural Networks
particle swarm optimisation
neural network Trojan detection
neural nets
malicious modifications
invasive software
intelligent neural networks algorithm
Integrated circuit modeling
HSPICE power consumption simulation
hardware Trojan detection
Hardware
Cryptography
biblio
Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
novel clustering ensemble method
untrustworthy testing party
untrustworthy testing parties
Unsupervised Learning
trusted hardware Trojan detection framework
Trusted Computing
Trojan horses
trojan horse detection
testing stage
testing
robust hardware Trojan detection framework
pubcrawl
pattern clustering
novel clustering ensemble technique
Clustering algorithms
invasive software
integrated circuit testing
Integrated circuit modeling
IC
hardware Trojan detection
Hardware Security
Hardware
golden models-free hardware Trojan detection framework
fabrication process
fabrication
existing hardware Trojan detection
clustering ensemble
biblio
Exploiting Phase Information in Thermal Scans for Stealthy Trojan Detection
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
modulation
weak thermal hot spots
Trojan horses
trojan horse detection
Trojan detection
thermal scans
Thermal Mapping
Temperature measurement
stealthy hardware Trojan detection
pubcrawl
Phase measurement
phase information
Phase
amplitude analysis
measurement platform
Lock-in Thermography
invasive software
integrated circuits
infrared thermography
infrared signals
infrared imaging
Heating systems
Hardware
formidable alternative
detection method
biblio
A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation
Submitted by grigby1 on Fri, 03/15/2019 - 10:58am
invasive software
Tunneling magnetoresistance
Trojan horses
trojan horse detection
Thwart Hardware Trojan insertion
Sensitivity
security of data
pubcrawl
prevention methods
original circuit
novel prevention technique
malicious modifications
logic circuits
ad-hoc design rules
integrated circuits
integrated circuit industry
Hardware Trojans
hardware trojan
Hardware
fabricated IC
error detection
critical circuits
Circuit faults
approximation
approximate logic circuit
biblio
Designing Subspecies of Hardware Trojans and Their Detection Using Neural Network Approach
Submitted by grigby1 on Fri, 03/15/2019 - 10:58am
learning (artificial intelligence)
true positive rate
Trojan horses
trojan horse detection
trigger circuits
TPR
third-party vendors
pubcrawl
outsourcing
neural-network based hardware-Trojan detection method
neural network approach
neural network
neural nets
machine-learning-based hardware-Trojan detection method
machine learning
Logic gates
Artificial Neural Networks
invasive software
integrated circuit design
high-performance hardware device
hardware trojan subspecies designing
hardware trojan
hardware devices mass-production
Hardware
gradient methods
gate-level netlist
feature extraction
electronic engineering computing
electric devices
Design Time
Benchmark testing
biblio
Grey Zone in Pre-Silicon Hardware Trojan Detection
Submitted by grigby1 on Fri, 03/15/2019 - 10:58am
invasive software
Trust-Hub
Trojan horses
trojan horse detection
Silicon
Si
pubcrawl
probability
pre-silicon hardware trojan detection method
Pre-Silicon Hardware Trojan Detection
machine learning
low signal probability
learning (artificial intelligence)
activation probability
integrated circuit testing
integrated circuit design
hardware Trojan benchmark circuits
Hardware
grey zone
functional test
elemental semiconductors
electronic engineering computing
benchmark
behaviour simulations
Behaviour Simulation
biblio
Visible but Transparent Hardware Trojans in Clock Generation Circuits
Submitted by grigby1 on Wed, 04/11/2018 - 2:01pm
clock generation circuits
Clocks
composability
cyber physical systems
Frequency conversion
Hardware
Injection-locked oscillators
pubcrawl
resilience
Resiliency
Ring oscillators
transparent Trojans
trojan horse detection
Trojan horses
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »