Combinatorial testing has rapidly gained favor among software testers in the past decade as improved algorithms have become available and practical success has been demonstrated …
Protection against Hardware Trojans with Logic Testing: Proposed Solutions and Challenges Ahead Page 1 2168-2356 (c) 2017 IEEE. Personal use is permitted, but …
Y Lyu, P Mishra - … Transactions on Computer-Aided Design of …, 2020 - ieeexplore.ieee.org
Hardware Trojans are serious threat to security and reliability of computing systems. It is hard to detect these malicious implants using traditional validation methods since an …
Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be …
K Kleine, DE Simos - Mathematics in Computer Science, 2018 - Springer
Abstract The In-Parameter-Order-General algorithm is one of the most widely used algorithms for covering array generation. It has found wide adoption in the field of …
L Kampel, DE Simos - Theoretical Computer Science, 2019 - Elsevier
In this paper, a first systematic review and analysis of the current state of the art pertaining to complexity problems for a heavily researched class of designs, namely covering arrays, is …
M Cetin, DM Malioutov… - 2002 IEEE International …, 2002 - ieeexplore.ieee.org
We propose a novel non-parametric technique for source localization with passive sensor arrays. Our approach involves formulation of the problem in a variational framework where …
This paper presents a novel method for locating combinational hardware Trojans (HT) based on fault location approaches used in combinatorial testing. This method relies …
The insertion of malicious alterations to a circuit, referred to as Hardware Trojans, is a threat considered more and more seriously during the last years. Numerous methods have been …