TM Supon, R Rashidzadeh - Microprocessors and Microsystems, 2023 - Elsevier
The design of modern integrated circuits includes many steps and different entities providing opportunities to adversaries for Trojan injection or IP (intellectual property) piracy at different …
Z Li, J Wang, Z Huang, N Luo, Q Wang - Applied Sciences, 2022 - mdpi.com
Hardware Trojans (HTs) are malicious hardware components designed to leak confidential information or cause the chip/circuit on which they are integrated to malfunction during …
Z Li, J Wang, Z Huang, Q Wang - … International Conference on …, 2022 - ieeexplore.ieee.org
Coarse-Grained Reconfigurable Arrays (CGRA) im-plemented using FPGA are widely applied due to the portability and compatibility. As an evolvable hardware (EHW) platform, it …
Nowadays the security of the design is so important because of the different available attacks to the system. the main aim of this paper is to improve the security of the circuit …
Y Fazea, F Mohammed… - 2021 International …, 2021 - ieeexplore.ieee.org
Hardware Trojan (HT) is a malicious program that can cause various kinds of effects related to sensitive information leakage, changes in computer functionality, and Denial of Service …
S Ye, W Qin, T Chen, D Ou… - Proceedings of the 2024 …, 2024 - books.google.com
Bottom layer API interface evasion technology is one of the core technologies in current evasion technology and is also one of the leading technologies in network security. In order …
There are many different ways of securing FPGAs to prevent successful reverse engineering. One of the common forms is obfuscation methods. In this paper, we proposed …
There are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern …