Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels
Abstract Modern electronic systems usually use third‐party IP cores to build basic blocks. However, there may be Hardware Trojans (HTs) in IP cores, which will cause critical security problem. There are already many HT detection methods which claim to detect all publicly available HT benchmarks. But...
Saved in:
Main Authors: | Ying Zhang, Minghui Ge, Xin Chen, Jiaqi Yao, Zhiming Mao |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2022-01-01
|
Series: | IET Circuits, Devices and Systems |
Subjects: | |
Online Access: | https://doi.org/10.1049/cds2.12088 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Hardware Efficient Speech Enhancement With Noise Aware Multi-Target Deep Learning
by: Salinna Abdullah, et al.
Published: (2024-01-01) -
Design of a 128‐channel transceiver hardware for medical ultrasound imaging systems
by: Jayaraj Kidav, et al.
Published: (2022-01-01) -
Multi‐precision binary multiplier architecture for multi‐precision floating‐point multiplication
by: Geetam Singh Tomar, et al.
Published: (2021-08-01) -
Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture
by: Xiaoying Huang, et al.
Published: (2021-11-01) -
Fast approximation of the top‐k items in data streams using FPGAs
by: Ali Ebrahim, et al.
Published: (2023-03-01)