Cargando…
Hardware Trojans in Chips: A Survey for Detection and Prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourc...
Autores principales: | Dong, Chen, Xu, Yi, Liu, Ximeng, Zhang, Fan, He, Guorong, Chen, Yuzhong |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7570641/ https://www.ncbi.nlm.nih.gov/pubmed/32927772 http://dx.doi.org/10.3390/s20185165 |
Ejemplares similares
-
A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection
por: Dong, Chen, et al.
Publicado: (2023) -
Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
por: Hussain, Musharraf, et al.
Publicado: (2023) -
Trusted digital circuits: hardware trojan vulnerabilities, prevention and detection
por: Salmani, Hassan
Publicado: (2018) -
Integrated circuit authentication: hardware Trojans and counterfeit detection
por: Tehranipoor, Mohammad, et al.
Publicado: (2013) -
The hardware trojan war: attacks, myths, and defenses
por: Bhunia, Swarup, et al.
Publicado: (2017)