Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trojan horse detection
biblio
Programmable Assertion Checkers for Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
outsourcing
VLSI chips
Trojan horses
trojan horse detection
system-on-chip
system on chip
SoC
security of data
Resiliency
resilience
pubcrawl
programmable logic fabric
programmable logic arrays
programmable assertion checkers
product development
circuit complexity
Monitoring
manufactured product security
manufactured product authenticity
integrated circuit design
hardware Trojan detection
hardware assertion optimization
Hardware
field programmable gate arrays
design complexity
cyber physical systems
cost reduction
composability
Circuit synthesis
circuit designers
biblio
Analysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasures
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
HT defense
Trojan horses
trojan horse detection
side-channel attacks
side-channel attack AES hardware Trojan benchmarks
Side-channel attack
Resiliency
resilience
pubcrawl
HT detection
HT design
AES benchmark
HT benchmark
hardware trojan
hardware security issue
Hardware Security
Hardware
encryption
cyber physical systems
Cryptography
composability
Benchmark testing
biblio
Hardware Trojan Detection Based on Correlated Path Delays in Defiance of Variations with Spatial Correlations
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
intradie variation
Trojan horses
trojan horse detection
spatial correlations
Solid modeling
side channel analysis
Resiliency
resilience
pubcrawl
Process Variations
path delay ratio
path delay
minimally invasive Trojans
malicious circuit
Logic gates
invasive software
composability
interdie variation
Integrated circuit modeling
Integrated circuit interconnections
Image edge detection
HT inserted circuits
HT detection methods
HT detection method
hardware Trojan detection
Hardware Security
delays
cyber physical systems
Cryptography
Correlation
correlated path delays
biblio
Trojan-Feature Extraction at Gate-Level Netlists and Its Application to Hardware-Trojan Detection Using Random Forest Classifier
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Logic gates
TrustHUB benchmarks
Trojan-feature extraction
Trojan nets
Trojan horses
trojan horse detection
Resiliency
resilience
random forest classifier
Random Forest
pubcrawl
normal nets
Multiplexing
malicious third-party vendors
machine-learning based hardware Trojan classifier
machine learning
Benchmark testing
learning (artificial intelligence)
invasive software
integrated circuits
integrated circuit design
IC design process
hardware-Trojan infected nets
hardware-Trojan detection
hardware trojan
Hardware
gate-level netlists
gate-level netlist
feature extraction
F-measure
cyber physical systems
composability
biblio
Combinational Hardware Trojan Detection Using Logic Implications
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
logical implications
valid logic implications
Trojan horses
trojan horse detection
security
Resiliency
resilience
pubcrawl
proof-of-concept demonstration
potential benefit
Payloads
combinational circuits
logic simulation
Logic gates
logic design
invasive software
Integrated circuit modeling
Hardware
cyber physical systems
composability
combinational hardware trojan detection
biblio
Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
mission critical applications
Trojan horses
trojan horse detection
traditional techniques
Temperature sensors
system-on-chip
simple processing mechanism
runtime hardware Trojan detection techniques
Runtime
Resiliency
resilience
pubcrawl
power distribution networks
Monitoring
behavior profiling
manufacturing test phase
IP based SoC
invasive software
Intrusion Detection
integrated circuits
Hardware
golden data model
digital power profile
cyber physical systems
Cryptography
composability
classical Advanced Encryption Standard circuit
circuit under test
biblio
Detection and Masking of Trojan Circuits in Sequential Logic
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Resiliency
Trojan horses
trojan horse detection
Trojan circuit masking
Trojan circuit detection
TC switch description
TC switch
sub-circuit overhead masking
STG description
state variables
state transition graph description
state estimation
sequential circuits
sequential circuit nodes
ROBDDs
binary decision diagrams
resilience
reduced ordered binary decision diagrams
pubcrawl
precise random estimations
Observability
Logic gates
internal node observability
internal node controllability
graph theory
estimation
cyber physical systems
Controllability
composability
Boolean functions
biblio
Hardware Trojan Detection through Information Flow Security Verification
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Payloads
untrusted vendors
Trusted Computing
trust-hub benchmarks
Trojan horses
trojan horse detection
time-to-market constraints
security
Resiliency
resilience
pubcrawl
automatic test pattern generation
IP networks
invasive software
intellectual property
information flow security verification
industrial property
Hardware Trojan detection framework
Hardware
cyber physical systems
composability
Benchmark testing
biblio
Early Detection of In-the-Wild Botnet Attacks by Exploiting Network Communication Uniformity: An Empirical Study
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Resiliency
multiple infected machines
network behaviour
network communication uniformity
outgoing bot attacks
port scanning attacks
pubcrawl
real-world spamming
resilience
Monitoring
Servers
synchronised behaviour
Synchronization
trojan horse detection
Trojan horses
unsolicited e-mail
widespread infection
botnet communication
malicious behaviour
large-scale malware propagation campaigns
invasive software
in-the-wild botnet attacks
early infection
early detection
distributed attack
cyber physical systems
computer network security
Computer crime
composability
command botnets
botnet-infected machines
botnet traffic
botnet controllers
biblio
Intra-Die-Variation-Aware Side Channel Analysis for Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 2:59pm
Sensitivity
logic testing
Power based Side-channel
Power measurement
probability
process variation levels
Process Variations
pubcrawl
relative power difference
resilience
Resiliency
logic circuits
sequential type Trojans
side channel analysis
spatial correlation
Systematics
test pattern generation
Trojan activation probability
trojan horse detection
Trojan horses
Trojan inserted circuits
hardware trojan
automatic test pattern generation
combinational type Trojans
composability
cyber physical systems
delays
Detection sensitivity
efficient Trojan detection approach
elevated process variations
Hardware
AES-128 circuit
hardware Trojan detection
high detection sensitivity
integrated circuit design
integrated circuit testing
integrated circuits
intra-die-variation
invasive software
ISCAS 89 benchmark
ITC 99 benchmark
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »