ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A method of implanting combinational hardware Trojan based on evolvable hardware
Computers & Electrical Engineering
◽
10.1016/j.compeleceng.2021.107229
◽
2021
◽
Vol 93
◽
pp. 107229
Author(s):
Lijun Liu
◽
Tao Wang
◽
Xiaohan Wang
◽
Tianyu He
Keyword(s):
Evolvable Hardware
◽
Hardware Trojan
Download Full-text
Related Documents
Cited By
References
On the feasibility of using evolvable hardware for hardware Trojan detection and prevention
Applied Soft Computing
◽
10.1016/j.asoc.2020.106247
◽
2020
◽
Vol 91
◽
pp. 106247
◽
Cited By ~ 1
Author(s):
Mansoureh Labafniya
◽
Stjepan Picek
◽
Shahram Etemadi Borujeni
◽
Nele Mentens
Keyword(s):
Evolvable Hardware
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Quantification of Power Based Hardware Trojan Detection Under Realistic Variations and Separation of Power Supplies
2019 11th International Conference on Electrical and Electronics Engineering (ELECO)
◽
10.23919/eleco47770.2019.8990399
◽
2019
◽
Author(s):
Mehmet Kocabas
◽
Alp Arslan Bayrakci
Keyword(s):
Power Supplies
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Data Augmentation for Machine Learning-Based Hardware Trojan Detection at Gate-Level Netlists
2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS)
◽
10.1109/iolts52814.2021.9486713
◽
2021
◽
Author(s):
Kento Hasegawa
◽
Seira Hidano
◽
Kohei Nozawa
◽
Shinsaku Kiyomoto
◽
Nozomu Togawa
Keyword(s):
Machine Learning
◽
Data Augmentation
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Brain-Inspired Golden Chip Free Hardware Trojan Detection
IEEE Transactions on Information Forensics and Security
◽
10.1109/tifs.2021.3062989
◽
2021
◽
pp. 1-1
Author(s):
Sina Faezi
◽
Rozhin Yasaei
◽
Anomadarshi Barua
◽
Mohammad Abdullah Al Faruque
Keyword(s):
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Hardware Trojan Free Netlist Identification: A Clustering Approach
Journal of Electronic Testing
◽
10.1007/s10836-021-05953-1
◽
2021
◽
Author(s):
Anindan Mondal
◽
Rajesh Kumar Biswal
◽
Mahabub Hasan Mahalat
◽
Suchismita Roy
◽
Bibhash Sen
Keyword(s):
Hardware Trojan
◽
Clustering Approach
Download Full-text
Hardware Trojan Attack in Embedded Memory
ACM Journal on Emerging Technologies in Computing Systems
◽
10.1145/3422353
◽
2021
◽
Vol 17
(1)
◽
pp. 1-28
Author(s):
Xinmu Wang
◽
Tamzidul Hoque
◽
Abhishek Basak
◽
Robert Karam
◽
Wei Hu
◽
...
Keyword(s):
Hardware Trojan
◽
Embedded Memory
Download Full-text
Hardware-Trojan Classification based on the Structure of Trigger Circuits Utilizing Random Forests
2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS)
◽
10.1109/iolts52814.2021.9486700
◽
2021
◽
Author(s):
Tatsuki Kurihara
◽
Nozomu Togawa
Keyword(s):
Random Forests
◽
Hardware Trojan
Download Full-text
Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits
2021 International Symposium on Devices, Circuits and Systems (ISDCS)
◽
10.1109/isdcs52006.2021.9397908
◽
2021
◽
Author(s):
Subhashree Basu
◽
Malay Kule
◽
Hafizur Rahaman
Keyword(s):
Hardware Trojan
Download Full-text
AdaTrust: Combinational Hardware Trojan Detection Through Adaptive Test Pattern Construction
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
◽
10.1109/tvlsi.2021.3053553
◽
2021
◽
Vol 29
(3)
◽
pp. 544-557
Author(s):
Chris Nigh
◽
Alex Orailoglu
Keyword(s):
Test Pattern
◽
Hardware Trojan
◽
Adaptive Test
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
ForASec: Formal Analysis of Hardware Trojan-based Security Vulnerabilities in Sequential Circuits
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
◽
10.1109/tcad.2021.3061524
◽
2021
◽
pp. 1-1
Author(s):
Faiq Khalid
◽
Imran Hafeez Abbassi
◽
Semeen Rehman
◽
Awais Mehmood Kamboh
◽
Osman Hasan
◽
...
Keyword(s):
Formal Analysis
◽
Sequential Circuits
◽
Hardware Trojan
◽
Security Vulnerabilities
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close