The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Trojans with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2004 (16) 2005-2008 (30) 2009-2010 (19) 2011-2013 (21) 2014 (26) 2015 (24) 2016 (27) 2017 (34) 2018 (36) 2019 (26) 2020 (36) 2021 (26) 2022 (30) 2023 (43) 2024 (9)
Publication types (Num. hits)
article(150) incollection(3) inproceedings(247) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 61 occurrences of 52 keywords

Results
Found 403 publication records. Showing 403 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
95Mohammad Tehranipoor, Farinaz Koushanfar A Survey of Hardware Trojan Taxonomy and Detection. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hardware Trojans, Trojan taxonomy and detection, security, design and test, ICs
68Mainak Banga, Maheshwar Chandrasekar, Lei Fang 0002, Michael S. Hsiao Guided test generation for isolation and detection of embedded trojans in ics. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trojan
68Reza M. Rad, Jim Plusquellic, Mohammad Tehranipoor Sensitivity Analysis to Hardware Trojans using Power Supply Transient Signals. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
67Francis G. Wolff, Christos A. Papachristou An Embedded Flash Memory Vault for Software Trojan Protection. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51Reza M. Rad, Xiaoxiao Wang 0001, Mohammad Tehranipoor, Jim Plusquellic Power supply signal calibration techniques for improving detection resolution to hardware Trojans. Search on Bibsonomy ICCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51Mainak Banga, Michael S. Hsiao A Region Based Approach for the Identification of Hardware Trojans. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51Muazzam Siddiqui, Morgan C. Wang, Joohan Lee Detecting Trojans Using Data Mining Techniques. Search on Bibsonomy IMTIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trojan Detection, Data Mining, Support Vector Machines, Principal Component Analysis, Random Forest, Disassembly
50Xiaoxiao Wang 0001, Mohammad Tehranipoor, Jim Plusquellic Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Yier Jin, Yiorgos Makris Hardware Trojan Detection Using Path Delay Fingerprint. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Bruce Schneier Customers, Passwords, and Web Sites. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Trojans, stealing passwords, phishing
36Zhixin Pan, Prabhat Mishra 0001 Design of AI Trojans for Evading Machine Learning-based Detection of Hardware Trojans. Search on Bibsonomy DATE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
35Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information theft detection, Intrusion detection, information theory, malware analysis
35Mainak Banga, Michael S. Hsiao A Novel Sustained Vector Technique for the Detection of Hardware Trojans. Search on Bibsonomy VLSI Design The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne P. Burleson Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Trojan Hardware, Trojan Side-Channel, Hardware Trojan Detection, Covert Channel, Side-Channel Analysis
33Xiaoxiao Wang 0001, Hassan Salmani, Mohammad Tehranipoor, James F. Plusquellic Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis. Search on Bibsonomy DFT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Dakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar Trojan Detection using IC Fingerprinting. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang, Michel Wang, Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges. Search on Bibsonomy Computer The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Hardware Trojans, Side-channel signal analysis, Integrated circuits, Intellectual property
28Mohammad Tehranipoor, Farinaz Koushanfar Guest Editors' Introduction: Confronting the Hardware Trustworthiness Problem. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hardware Trojans, Trojan attack, design and test, security measures, secret key, IP protection
28 Design & Test in the new decade: Continuity and new directions. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF physical trustworthiness, Trojans, VPOS, verification, design and test
18Junjun Huan, Shubhra Deb Paul, Soumyajit Mandal, Swarup Bhunia PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Dina G. Mahmoud, Beatrice Shokry, Vincent Lenders, Wei Hu 0008, Mirjana Stojilovic X-Attack 2.0: The Risk of Power Wasters and Satisfiability Don't-Care Hardware Trojans to Shared Cloud FPGAs. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Vasudev Gohil, Satwik Patnaik, Hao Guo, Dileep Kalathil, Jeyavijayan Rajendran DETERRENT: Detecting Trojans Using Reinforcement Learning. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Syam Sankar, Ruchika Gupta, John Jose, Sukumar Nandi TROP: TRust-aware OPportunistic Routing in NoC with Hardware Trojans. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Athanassios Moschos, Fabian Monrose, Angelos D. Keromytis Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Rupshali Roy, Subrata Das, Swaroop Ghosh Hardware Trojans in Quantum Circuits, Their Impacts, and Defense. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Mohammad Eslami, Tara Ghasempouri, Samuel Pagliarini SCARF: Securing Chips with a Robust Framework against Fabrication-time Hardware Trojans. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Stefano Ribes, Fabio Malatesta, Grazia Garzo, Alessandro Palumbo Machine Learning-Based Classification of Hardware Trojans in FPGAs Implementing RISC-V Cores. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Animesh Basak Chowdhury, Anushree Mahapatra, Yang Liu, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri A Golden-Free Approach to Detect Trojans in COTS Multi-PCB Systems. Search on Bibsonomy IEEE Micro The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sarwono Sutikno, Septafiansyah Dwi Putra, Fajar Wijitrisnanto, Muhamad Erza Aminanto Detecting Unknown Hardware Trojans in Register Transfer Level Leveraging Verilog Conditional Branching Features. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Abhijitt Dhavlle, M. Meraj Ahmed, Naseef Mansoor, Kanad Basu, Amlan Ganguly, Sai Manoj Pudukotai Dinakarrao Defense Against On-Chip Trojans Enabling Traffic Analysis Attacks Based on Machine Learning and Data Augmentation. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Aruna Jayasena, Prabhat Mishra 0001 Scalable Detection of Hardware Trojans Using ATPG-Based Activation of Rare Events. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Suvadip Hazra, Boppudi Avinash, Mamata Dalui Design, threat analysis and countermeasures for cache replacement policy-affecting Hardware Trojans in the context of a many-core system. Search on Bibsonomy Microelectron. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ruochen Dai, Tuba Yavuz A Symbolic Approach to Detecting Hardware Trojans Triggered by Don't Care Transitions. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Prithwish Basu Roy, Mudit Bhargava, Chia-Yun Chang, Ellen Hui, Nikhil Gupta 0002, Ramesh Karri, Hammond Pearce A survey of Digital Manufacturing Hardware and Software Trojans. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Chong Fu, Xuhong Zhang 0002, Shouling Ji, Ting Wang 0006, Peng Lin, Yanghe Feng, Jianwei Yin FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Subrata Das, Swaroop Ghosh TrojanNet: Detecting Trojans in Quantum Circuits using Machine Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sofia Maragkou, Axel Jantsch Information Flow Tracking Methods for Protecting Cyber-Physical Systems against Hardware Trojans - a Survey. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Joshua Strubel Detecting Neural Trojans Through Merkle Trees. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Jacob Sillman, Ajay Suresh Hardware Trojans in Power Conversion Circuits. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Enahoro Oriero, Faiq Khalid, Syed Rafay Hasan DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Leonard Tang, Tom Shlomi, Alexander Cai Learning the Wrong Lessons: Inserting Trojans During Knowledge Distillation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Alexander Warnecke, Julian Speith, Jan-Niklas Möller, Konrad Rieck, Christof Paar Evil from Within: Machine Learning Backdoors through Hardware Trojans. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Aftab Hussain 0001, Md. Rafiqul Islam Rabin, Toufique Ahmed, Bowen Xu, Prem Devanbu, Mohammad Amin Alipour A Survey of Trojans in Neural Models of Source Code: Taxonomy and Techniques. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yuntao Liu 0001, Aruna Jayasena, Prabhat Mishra 0001, Ankur Srivastava 0001 Logic Locking based Trojans: A Friend Turns Foe. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Raja Adhithan RadhaKrishnan A Black Box Attack Using Side Channel Analysis and Hardware Trojans. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Xingyu Meng, Abhrajit Sengupta, Kanad Basu A Needle in the Haystack: Inspecting Circuit Layout to Identify Hardware Trojans. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Honorio Martín, Sophie Dupuis, Giorgio Di Natale, Luis Entrena Using Approximate Circuits Against Hardware Trojans. Search on Bibsonomy IEEE Des. Test The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Prashanth Krishnamurthy, Virinchi Roy Surabhi, Hammond Pearce, Ramesh Karri, Farshad Khorrami Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Thomas Gourousis, Ziyue Zhang, Mengting Yan, Milin Zhang 0002, Ankit Mittal, Aatmesh Shrivastava, Francesco Restuccia 0001, Yunsi Fei, Marvin Onabajo Identification of Stealthy Hardware Trojans through On-Chip Temperature Sensing and an Autoencoder-Based Machine Learning Algorithm. Search on Bibsonomy MWSCAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Kevin Immanuel Gubbi, Inderpreet Kaur, Abdallah Hashem, Sai Manoj P. D., Houman Homayoun, Avesta Sasan, Soheil Salehi Securing AI Hardware: Challenges in Detecting and Mitigating Hardware Trojans in ML Accelerators. Search on Bibsonomy MWSCAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sajjad Parvin, Mehran Goli, Thilo Krachenfels, Shahin Tajik, Jean-Pierre Seifert, Frank Sill Torres, Rolf Drechsler LAT-UP: Exposing Layout-Level Analog Hardware Trojans Using Contactless Optical Probing. Search on Bibsonomy ISVLSI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Feisi Fu, Panagiota Kiourti, Wenchao Li 0001 Dormant Neural Trojans. Search on Bibsonomy ICMLA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Suman Deb, Anupam Chattopadhyay, Avi Mendelson A RISC-V SoC with Hardware Trojans: Case Study on Trojan-ing the On-Chip Protocol Conversion. Search on Bibsonomy VLSI-SoC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Lingxi Wu, Rahul Sreekumar, Rasool Sharifi, Kevin Skadron, Mircea R. Stan, Ashish Venkat Hardware Trojans in eNVM Neuromorphic Devices. Search on Bibsonomy DATE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Syam Sankar, John Jose, Ruchika Gupta, Sukumar Nandi Enhancing Anonymity in NoC Communication to Counter Traffic Profiling by Hardware Trojans. Search on Bibsonomy MCSoC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sajjad Parvin, Mehran Goli, Frank Sill Torres, Rolf Drechsler Trojan-D2: Post-Layout Design and Detection of Stealthy Hardware Trojans - A RISC-V Case Study. Search on Bibsonomy ASP-DAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Enahoro Oriero, Faiq Khalid, Syed Rafay Hasan DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans. Search on Bibsonomy HASP@MICRO The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ludwig Kampel, Paris Kitsos, Dimitris E. Simos Summary of Locating Hardware Trojans using Combinatorial Testing for Cryptographic Circuits. Search on Bibsonomy ICSTW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mohammed M. Alani, Atefeh Mashatan, Ali Miri Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks. Search on Bibsonomy ACNS Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Chong Fu, Xuhong Zhang 0002, Shouling Ji, Ting Wang 0006, Peng Lin, Yanghe Feng, Jianwei Yin FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
18Komail Dharsee, John Criswell Jinn: Hijacking Safe Programs with Trojans. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
18Fangzhou Wang, Qijing Wang, Bangqi Fu, Shui Jiang, Xiaopeng Zhang 0009, Lilas Alrahis, Ozgur Sinanoglu, Johann Knechtel, Tsung-Yi Ho, Evangeline F. Y. Young Security Closure of IC Layouts Against Hardware Trojans. Search on Bibsonomy ISPD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Christian Lanius, Florian Freye, Shutao Zhang, Tobias Gemmeke Hardware Trojans in fdSOI. Search on Bibsonomy ISLPED The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing. Search on Bibsonomy AsiaCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Prashanth Krishnamurthy, Hammond Pearce, Virinchi Roy Surabhi, Joshua Trujillo, Ramesh Karri, Farshad Khorrami An Integrated Testbed for Trojans in Printed Circuit Boards with Fuzzing Capabilities. Search on Bibsonomy IOLTS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Shih-Hsu Huang, Wei-Che Cheng, Jin-Fu Li 0001 Hardware Trojans of Computing-In-Memories: Issues and Methods. Search on Bibsonomy DFT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Guangyu Shen, Siyuan Cheng 0005, Guanhong Tao 0001, Kaiyuan Zhang 0002, Yingqi Liu, Shengwei An, Shiqing Ma, Xiangyu Zhang 0001 Django: Detecting Trojans in Object Detection Models via Gaussian Focus Calibration. Search on Bibsonomy NeurIPS The full citation details ... 2023 DBLP  BibTeX  RDF
18Qazi Arbab Ahmed, Muhammad Awais 0009, Marco Platzner MAAS: Hiding Trojans in Approximate Circuits. Search on Bibsonomy ISQED The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yuqin Dou, Chongyan Gu, Chenghua Wang, Weiqiang Liu 0001 A Novel Method Against Hardware Trojans in Approximate Circuits. Search on Bibsonomy ISQED The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Lin Ni, Qiukai Ye, Ming Xian, Shuai Zhang, Zihui Liu The Effect of Matching Block Resolution on IP Softcore Hardware Trojans Map Detection. Search on Bibsonomy ICAIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ludwig Kampel, Paris Kitsos, Dimitris E. Simos Locating Hardware Trojans Using Combinatorial Testing for Cryptographic Circuits. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Hammond Pearce, Virinchi Roy Surabhi, Prashanth Krishnamurthy, Joshua Trujillo, Ramesh Karri, Farshad Khorrami Detecting Hardware Trojans in PCBs Using Side Channel Loopbacks. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Erik J. Jorgensen, Andrew Kacmarcik, Milos Prvulovic, Alenka G. Zajic Novel Feature Selection for Non-destructive Detection of Hardware Trojans Using Hyperspectral Scanning. Search on Bibsonomy J. Hardw. Syst. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Nimisha Limaye, Nikhil Rangarajan, Satwik Patnaik, Ozgur Sinanoglu, Kanad Basu PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans. Search on Bibsonomy IEEE Trans. Emerg. Top. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Fatemeh Khormizi, Ahmad Shabani, Bijan Alizadeh Hardware Patching Methodology for Neutralizing Timing Hardware Trojans Using Vulnerability Analysis and Time Borrowing Scheme. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Nidish Vashistha, Hangwei Lu, Qihang Shi, Damon L. Woodard, Navid Asadizanjani, Mark M. Tehranipoor Detecting Hardware Trojans Using Combined Self-Testing and Imaging. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Zhenting Wang, Hailun Ding, Juan Zhai, Shiqing Ma Neural Network Trojans Analysis and Mitigation from the Input Domain. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
18Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran Game of Trojans: A Submodular Byzantine Approach. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Mayukhmali Das, Sounak Dutta, Sayan Chatterjee Logic and Reduction Operation based Hardware Trojans in Digital Design. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Fangzhou Wang, Qijing Wang, Bangqi Fu, Shui Jiang, Xiaopeng Zhang 0009, Lilas Alrahis, Ozgur Sinanoglu, Johann Knechtel, Tsung-Yi Ho, Evangeline F. Y. Young Security Closure of IC Layouts Against Hardware Trojans. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Vasudev Gohil, Satwik Patnaik, Hao Guo, Dileep Kalathil, Jeyavijayan Rajendran DETERRENT: Detecting Trojans using Reinforcement Learning. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Feisi Fu, Panagiota Kiourti, Wenchao Li 0001 Dormant Neural Trojans. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Aleksa Damljanovic, Annachiara Ruospo, Ernesto Sánchez 0001, Giovanni Squillero Machine learning for hardware security: Classifier-based identification of Trojans in pipelined microprocessors. Search on Bibsonomy Appl. Soft Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
18Bharat Bisht, Shirshendu Das BHT-NoC: Blaming Hardware Trojans in NoC Routers. Search on Bibsonomy IEEE Des. Test The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Farhath Zareen, Robert Karam A Framework for Detecting Hardware Trojans in RTL Using Artificial Immune Systems. Search on Bibsonomy Behavioral Synthesis for Hardware Security The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Luca Cassano, Elia Lazzeri, Nikita Litovchenko, Giorgio Di Natale On the optimization of Software Obfuscation against Hardware Trojans in Microprocessors. Search on Bibsonomy DDECS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos zk -Sherlock: Exposing Hardware Trojans in Zero-Knowledge. Search on Bibsonomy ISVLSI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Qazi Arbab Ahmed, Marco Platzner On the Detection and Circumvention of Bitstream-level Trojans in FPGAs. Search on Bibsonomy ISVLSI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Dmitry Utyamishev, Inna Partin-Vaisband Knowledge Graph Embedding and Visualization for Pre-Silicon Detection of Hardware Trojans. Search on Bibsonomy ISCAS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Edian B. Annink, Gerard K. Rauwerda, Edwin A. Hakkennes, Alessandra Menicucci, Stefano Di Mascio, Gianluca Furano, Marco Ottavi Preventing Soft Errors and Hardware Trojans in RISC-V Cores. Search on Bibsonomy DFT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Mahdieh Grailoo, Mairo Leier, Samuel Pagliarini Hardware Trojans for Confidence Reduction and Misclassifications on Neural Networks. Search on Bibsonomy ISQED The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Mayukhmali Das, Sounak Dutta, Sayan Chatterjee Logic and Reduction Operation based Hardware Trojans in Digital Design. Search on Bibsonomy ISOCC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Zeyu Li, Zhao Huang, Junjie Wang, Quan Wang 0006 Investigate of Mitigation Solution against Hardware Trojans Attack on Evolvable Hardware Platform. Search on Bibsonomy ISOCC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Mohammad Rahman, Laurent Njilla, Swastik Brahma Optimization of Survivability of a Mission Critical System in the Presence of Hardware Trojans. Search on Bibsonomy CCWC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Senjie Zhang, Shuai Wang, Jinbo Wang, Shan Zhou, Zhaohui Yao Quantitative Analysis of Information Leakage Hardware Trojans in IP Cores. Search on Bibsonomy DSA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Nishant Gupta, Mohil Sandip Desai, Mark Wijtvliet, Shubham Rai, Akash Kumar 0001 DELTA: DEsigning a stealthy trigger mechanism for analog hardware trojans and its detection analysis. Search on Bibsonomy DAC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Vasudev Gohil, Satwik Patnaik, Hao Guo, Dileep Kalathil, Jeyavijayan (JV) Rajendran DETERRENT: detecting trojans using reinforcement learning. Search on Bibsonomy DAC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Qazi Arbab Ahmed Hardware trojans in reconfigurable computing. Search on Bibsonomy 2022   RDF
Displaying result #1 - #100 of 403 (100 per page; Change: )
Pages: [1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license