ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Novel Detection Method for Hardware Trojan in Third Party IP Cores
2016 International Conference on Information System and Artificial Intelligence (ISAI)
◽
10.1109/isai.2016.0118
◽
2016
◽
Cited By ~ 1
Author(s):
Er-Rui Zhou
◽
Shao-Qing Li
◽
Ji-Hua Chen
◽
Lin Ni
◽
Zhi-Xun Zhao
◽
...
Keyword(s):
Detection Method
◽
Third Party
◽
Hardware Trojan
◽
Ip Cores
Download Full-text
Related Documents
Cited By
References
Hardware Trojan Detection: Untrusted Third-Party IP Cores
Integrated Circuit Authentication
◽
10.1007/978-3-319-00816-5_2
◽
2013
◽
pp. 19-30
Author(s):
Mohammad Tehranipoor
◽
Hassan Salmani
◽
Xuehui Zhang
Keyword(s):
Third Party
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
◽
Ip Cores
Download Full-text
Run-time Hardware Trojan Detection and Recovery for Third-Party IPs in SoC FPGAs
2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)
◽
10.1109/euc50751.2020.00009
◽
2020
◽
Author(s):
Luis Ramirez Rivera
◽
Xiaofang Wang
Keyword(s):
Third Party
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
◽
Run Time
Download Full-text
Hardware Trojan Detection Combines with Machine Learning: an Isolation Forest-based Detection Method
2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE)
◽
10.1109/bigdatase50710.2020.00021
◽
2020
◽
Author(s):
Taifeng Hu
◽
Liji Wu
◽
Xiangmin Zhang
◽
Zhaopo Liao
Keyword(s):
Machine Learning
◽
Detection Method
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
◽
Isolation Forest
Download Full-text
A Hardware Trojan Detection Method for IoT Sensors using Side Channel Activity Magnifier
IEEE Internet of Things Journal
◽
10.1109/jiot.2021.3105286
◽
2021
◽
pp. 1-1
Author(s):
E. Jedari
◽
R. Rashidzadeh
Keyword(s):
Detection Method
◽
Side Channel
◽
Hardware Trojan
◽
Channel Activity
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Underwater Target Detection Method Based on Third Party Information Transfer Learning
2020 5th International Conference on Advanced Robotics and Mechatronics (ICARM)
◽
10.1109/icarm49381.2020.9195292
◽
2020
◽
Author(s):
Tao Xu
◽
Jiyong Zhou
◽
Lei Cai
◽
Yukun Ma
Keyword(s):
Transfer Learning
◽
Target Detection
◽
Information Transfer
◽
Detection Method
◽
Third Party
◽
Underwater Target Detection
◽
Underwater Target
Download Full-text
Research on the Detection Method of HOG-SVM for Doping Modified Hardware Trojan
Journal of Physics Conference Series
◽
10.1088/1742-6596/1550/3/032086
◽
2020
◽
Vol 1550
◽
pp. 032086
Author(s):
Chaolong Sun
◽
Lei Li
◽
Wanting Zhou
◽
Xianjun Tan
◽
Yuanhang He
Keyword(s):
Detection Method
◽
Hardware Trojan
Download Full-text
A hardware Trojan detection method based on the electromagnetic leakage
China Communications
◽
10.23919/jcc.2019.12.007
◽
2019
◽
Vol 16
(12)
◽
pp. 100-110
◽
Cited By ~ 1
Author(s):
Lei Zhang
◽
Youheng Dong
◽
Jianxin Wang
◽
Chaoen Xiao
◽
Ding Ding
Keyword(s):
Detection Method
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Physical Hardware Trojan Failure Analysis and Detection Method
Mechatronics and Automation Engineering
◽
10.1142/9789813208537_0059
◽
2017
◽
Author(s):
Yang Luo
◽
Ya-Nan Wang
Keyword(s):
Failure Analysis
◽
Detection Method
◽
Hardware Trojan
Download Full-text
Untrusted Third Party Digital IP Cores
Proceedings of the 25th edition on Great Lakes Symposium on VLSI - GLSVLSI '15
◽
10.1145/2742060.2742061
◽
2015
◽
Cited By ~ 12
Author(s):
Anirban Sengupta
◽
Saumya Bhadauria
Keyword(s):
Third Party
◽
Ip Cores
Download Full-text
Case study: Detecting hardware Trojans in third-party digital IP cores
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
◽
10.1109/hst.2011.5954998
◽
2011
◽
Cited By ~ 106
Author(s):
Xuehui Zhang
◽
Mohammad Tehranipoor
Keyword(s):
Third Party
◽
Hardware Trojans
◽
Ip Cores
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close