Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
Inferring Malware Family through Application Protocol Sequences Signature
Submitted by BrandonB on Wed, 05/06/2015 - 2:01pm
application protocol sequences signature
computer network security
Cryptography
cyber-threats
Databases
Engines
Feeds
invasive software
learning (artificial intelligence)
machine learning algorithm
malicious packets detection
malware
malware automatic dynamic analysis
malware traffic detection
network traffic
Protocols
biblio
Reverse Engineering Digital Circuits Using Structural and Functional Analyses
Submitted by BrandonB on Wed, 05/06/2015 - 11:42am
reverse engineering
integrated circuit design
integrated circuits
intellectual property
invasive software
IP theft
IP violation detection
Logic gates
register files
Inference algorithms
SoC design
structural analysis
subtractors
system-on-chip
test circuits
Trojan horses
unstructured netlist
very large highly-optimized system-on-chip design
functional analysis
Algorithm design and analysis
algorithmic reverse engineering digital circuits
combinational elements
computer security
counters
design automation
Digital circuits
formal verification
adders
Globalization
globalized multivendor environment
Hardware
hardware trojans-malware
high-level netlist
ICs
industrial property
biblio
Hardware Trojan Attacks: Threat Analysis and Countermeasures
Submitted by BrandonB on Wed, 05/06/2015 - 11:40am
information processing
Trojan tolerance
Trojan taxonomy
Trojan horses
Trojan detection
threat analysis
side-channel analysis
self-referencing
reactive protection approach
proactive protection approach
invasive software
integrated circuits
Integrated circuit modeling
Circuit faults
hardware Trojan attacks
hardware Trojan attack
hardware obfuscation
Hardware intellectual property (IP) trust
Hardware
global economic trend
fabrication
electronics industry
electronic hardware malicious modifications
computer system security
computer security
biblio
Applied formal methods for hardware Trojan detection
Submitted by BrandonB on Wed, 05/06/2015 - 11:38am
integrated circuits
verification techniques
Vectors
Trojan horses
Trojan assurance level
silicon structure
model checking
Mathematical model
malicious hardware modifications
invasive software
chip development process
integrated circuit design
Hardware
formal verification
formal methods
formal hardware Trojan detection
Equations
electronic engineering computing
design phase
data structures
biblio
Real-time trust evaluation in integrated circuits
Submitted by BrandonB on Wed, 05/06/2015 - 11:37am
power-gating techniques
Trojan-infected variants
Trojan-free variants
Trojan horses
testing
statistical analysis
side-channel measurements
side-channel fingerprinting detection
shift registers
Semiconductor device measurement
reconfigurable linear feedback shift register array
real-time trust evaluation framework
advanced design skills
Power measurement
Power demand
post-fabrication trust evaluation methods
on-board global power consumption
LFSR array
invasive software
integrated circuits
hardware Trojan detection
Hardware
Erbium
chip trustworthiness
biblio
EM-based detection of hardware trojans on FPGAs
Submitted by BrandonB on Wed, 05/06/2015 - 11:37am
Layout
Xilinx Virtex-II Pro target
Trojan placement
Trojan horses
Software
side-channel analysis
sequential denial-of-service
RapidSmith
Probes
malicious circuitry
logic design
AES design
invasive software
Hardware Trojan injection
hardware Trojan detection
Hardware
FPGA
field programmable gate arrays
EM-based detection
EM measurement
electromagnetic emanation
Clocks
biblio
Tutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs
Submitted by BrandonB on Wed, 05/06/2015 - 11:35am
hardware-software codesign
Very large scale integration
vertical business model
Tutorials
Trojan horses
system integrity
original IC designs
life-critical systems
invasive software
integrated circuit testing
horizontal business model
Awards activities
Hardware Trojans
Hardware
electronic component supply chain
Educational institutions
counterfeit prevention
counterfeit IC
counterfeit electronic parts
counterfeit detection
Conferences
biblio
On application of one-class SVM to reverse engineering-based hardware Trojan detection
Submitted by BrandonB on Wed, 05/06/2015 - 11:35am
one-class support vector machine
well-studied machine learning method
Trojan-free IC identification
Trojan horses
Training
test-time detection approach
Support vector machines
reverse engineering-based hardware Trojan detection
reverse engineering
one-class SVM
electronic engineering computing
learning (artificial intelligence)
Layout
invasive software
integrated circuits
Integrated circuit modeling
integrated circuit design
golden model
feature extraction
fabrication outsourcing
biblio
Hardware trojan detection by symmetry breaking in path delays
Submitted by BrandonB on Wed, 05/06/2015 - 11:33am
inter-and intra-die variations
Trojan horses
Transistors
symmetry breaking
symmetric paths
subcircuit consistencies
side channel methods
Sensitivity
path delays
path delay
Logic gates
invasive software
benchmark circuits
integrated circuits
IC
HT
hardware Trojan detection
hardware trojan
Hardware
electronic engineering computing
detect modifications
delays
circuit symmetries
biblio
Detection of hardware Trojan in SEA using path delay
Submitted by BrandonB on Wed, 05/06/2015 - 11:33am
HTH detection and insertion
Trojan horses
Trojan circuits
SEA crypto
scalable encryption algorithm crypto
Scalable Encryption Algorithm (SEA)
payload Trojan detection rate
payload Trojan
path delay
Logic gates
logic circuits
layout level Trojan insertions
IP blocks
invasive software
Algorithm design and analysis
hardware Trojan horses insertion
Hardware Trojan horses (HTH)
hardware Trojan detection
Hardware
GDSII hard macros
GDSII
gate level Trojan insertions
fabless design house
encryption
delays
Cryptography
ASIC design flow
application specific integrated circuits
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
next ›
last »