Cargando…
Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated c...
Autores principales: | Hussain, Musharraf, Baloach, Naveed Khan, Ali, Gauhar, ElAffendi, Mohammed, Dhaou, Imed Ben, Ullah, Syed Sajid, Uddin, Mueen |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10144499/ https://www.ncbi.nlm.nih.gov/pubmed/37421062 http://dx.doi.org/10.3390/mi14040828 |
Ejemplares similares
-
Hardware Trojans in Chips: A Survey for Detection and Prevention
por: Dong, Chen, et al.
Publicado: (2020) -
BlockAuth: A blockchain-based framework for secure vehicle authentication and authorization
por: Ali, Gauhar, et al.
Publicado: (2023) -
The hardware trojan war: attacks, myths, and defenses
por: Bhunia, Swarup, et al.
Publicado: (2017) -
Integrated circuit authentication: hardware Trojans and counterfeit detection
por: Tehranipoor, Mohammad, et al.
Publicado: (2013) -
Improving Convergence Speed of Bat Algorithm Using Multiple Pulse Emissions along Multiple Directions
por: Younas, Waqar, et al.
Publicado: (2022)