Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Hardware Trojans
biblio
Deep Learning Based Approach for Hardware Trojan Detection
Submitted by grigby1 on Thu, 05/19/2022 - 1:04pm
deep learning
Neural networks
pubcrawl
resilience
Resiliency
Hardware
Analytical models
composability
Trojan horses
Hardware Trojans
Transistors
Distance measurement
Non-Invasive approach
outlier detection
trojan horse detection
biblio
Low-overhead Solutions For Preventing Information Leakage Due To Hardware Trojan Horses
Submitted by grigby1 on Thu, 05/19/2022 - 1:03pm
Trojan horses
trojan horse detection
Information Leakage
CRC
mac
Microprocessors
Cyclones
Hardware Trojans
resource management
encryption
Runtime
composability
Hardware
FPGA
Resiliency
resilience
pubcrawl
biblio
A Stealthy Hardware Trojan Design and Corresponding Detection Method
Submitted by grigby1 on Thu, 05/19/2022 - 1:03pm
Hardware Security
trojan horse detection
imbalanced controllability
Observability
unsupervised clustering
Controllability
transition probability
Systematics
Hardware Trojans
pubcrawl
Trojan horses
Benchmark testing
composability
Integrated circuit modeling
Hardware
Resiliency
resilience
biblio
Formal Verification Approach to Detect Always-On Denial of Service Trojans in Pipelined Circuits
Submitted by grigby1 on Thu, 05/19/2022 - 1:03pm
Logic gates
pubcrawl
resilience
Resiliency
Integrated circuit modeling
system-on-chip
composability
Benchmark testing
Trojan horses
formal verification
Hardware Trojans
Scalability
denial of service
Microprocessors
Always-On
trojan horse detection
biblio
Hardware Trojan Detection using Ring Oscillator
Submitted by grigby1 on Thu, 05/19/2022 - 12:59pm
pubcrawl
resilience
Resiliency
Hardware
Integrated circuit modeling
composability
Benchmark testing
Transient analysis
Trojan horses
Hardware Trojans
Ring oscillators
Ring Oscillator
Transient Effect Ring Oscillator
Trojan detection
Xilinx Vivado
trojan horse detection
biblio
Protecting the Supply Chain for Automotives and IoTs
Submitted by Katie Dey on Thu, 10/21/2021 - 11:44am
design for test
Hardware Trojans
key provisioning
secure keys
design for debug
biblio
Open-Source NoC-Based Many-Core for Evaluating Hardware Trojan Detection Methods
Submitted by aekwall on Thu, 09/30/2021 - 11:43am
security
Cryptography
Task Analysis
Trojan horses
Hardware Trojans
Hardware
Routing
Switches
pubcrawl
Scalability
Metrics
Resiliency
NoC
Many-core
network on chip security
biblio
On-line Detection and Localization of DoS Attacks in NoC
Submitted by aekwall on Thu, 09/30/2021 - 11:43am
security
Trojan horses
Hardware Trojans
Hardware
system-on-chip
Internet of Things
real-time systems
pubcrawl
Scalability
Metrics
Resiliency
random forests
denial of service
network on chip
random forest algorithm
network on chip security
biblio
Design and Implementation of a Secure Physical Unclonable Function In FPGA
Submitted by aekwall on Mon, 06/28/2021 - 12:40pm
Hamming distance
intellectual property security
Ring oscillators
Ring Oscillator PUF
Physical Unclonable Function
Intellectual Property Protection
Hardware Trojans
Challenge Response Pair
Inverters
field programmable gate arrays
Temperature measurement
Semiconductor device measurement
delays
policy-based governance
composability
pubcrawl
Resiliency
biblio
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
Submitted by aekwall on Mon, 03/29/2021 - 11:51am
Repeated game
zero-sum
third-party companies
prospect theory
optimal deception rationality
offshore manufacturing
multilevel game-theoretic framework
manufactured ICs
malicious IC manufacturer
learning stage
IC designers
Hardware Trojans
hardware Trojan detection
first-step deception mitigation process
deception analysis
actual game stage
Scalability
hypergame theory
integrated circuits
game theoretic security
Predictive Metrics
Human Factors
Cybersecurity
supply chains
Supply Chain
pubcrawl
Resiliency
learning (artificial intelligence)
deception
invasive software
game theory
1
2
3
4
next ›
last »