Academic literature on the topic 'Detection of Trojans'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Detection of Trojans.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Detection of Trojans"
Hazra, Suvadip, and Mamata Dalui. "CA-Based Detection of Coherence Exploiting Hardware Trojans." Journal of Circuits, Systems and Computers 29, no. 08 (October 18, 2019): 2050120. http://dx.doi.org/10.1142/s0218126620501200.
Full textWang, Lian Hai, and Qiu Liang Xu. "An APT Trojan Detection Method Based on Memory Forensics Techniques." Applied Mechanics and Materials 701-702 (December 2014): 927–34. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.927.
Full textZhao, Meng Meng, and Lian Hai Wang. "Research on Trojan Detection Method of Computer Memory Mirroring." Applied Mechanics and Materials 701-702 (December 2014): 1013–17. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.1013.
Full textRooney, Catherine, Amar Seeam, and Xavier Bellekens. "Creation and Detection of Hardware Trojans Using Non-Invasive Off-The-Shelf Technologies." Electronics 7, no. 7 (July 22, 2018): 124. http://dx.doi.org/10.3390/electronics7070124.
Full textPrathivi, Rastri, and Vensy Vydia. "ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK." Jurnal Transformatika 14, no. 2 (January 30, 2017): 77. http://dx.doi.org/10.26623/transformatika.v14i2.440.
Full textYoshikawa, Masaya, Yusuke Mori, and Takeshi Kumaki. "Implementation Aware Hardware Trojan Trigger." Advanced Materials Research 933 (May 2014): 482–86. http://dx.doi.org/10.4028/www.scientific.net/amr.933.482.
Full textAmelian, Atieh, and Shahram Etemadi Borujeni. "A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement." Journal of Circuits, Systems and Computers 27, no. 09 (April 26, 2018): 1850138. http://dx.doi.org/10.1142/s0218126618501384.
Full textYin, Khin Swe, and May Aye Khine. "Optimal remote access trojans detection based on network behavior." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (June 1, 2019): 2177. http://dx.doi.org/10.11591/ijece.v9i3.pp2177-2184.
Full textSheppard, Scott S., and Chadwick A. Trujillo. "Detection of a Trailing (L5) Neptune Trojan: Fig. 1." Science 329, no. 5997 (August 12, 2010): 1304. http://dx.doi.org/10.1126/science.1189666.
Full textReddy, Varun, and Nirmala Devi M. "FPGA Realization of Deep Neural Network for Hardware Trojan Detection." International Journal of Engineering & Technology 9, no. 3 (August 30, 2020): 764. http://dx.doi.org/10.14419/ijet.v9i3.30946.
Full textDissertations / Theses on the topic "Detection of Trojans"
Raju, Akhilesh. "Trojan Detection in Hardware Designs." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504781162418081.
Full textDharmadhikari, Pranav Hemant. "Hardware Trojan Detection in Sequential Logic Designs." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1543919236213844.
Full textBhamidipati, Harini. "SINGLE TROJAN INJECTION MODEL GENERATION AND DETECTION." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1253543191.
Full textHoque, Tamzidul. "Ring Oscillator Based Hardware Trojan Detection." University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1430413190.
Full textBanga, Mainak. "Partition based Approaches for the Isolation and Detection of Embedded Trojans in ICs." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/34924.
Full textThe inherent stealthy nature of Trojans makes it difficult to detect them at normal IC outputs. More so, with the restriction that one cannot visually inspect the internals of an IC after it has been manufactured. This obviates the use of side-channel signal(s) that acts like a signature of the IC as a means to assess its internal behavior under operational conditions.
In this work, we have selected power as the side-channel signal to characterize the internal
behavior of the ICs. We have used two circuit partitioning based approaches for isolating and
enhancing the behavioral difference between parts of a genuine IC and one with a sequence
detector Trojan in it. Experimental results reveal that these approaches are effective in
exposing anomalous behavior between the targeted ICs. This is reflected as difference in
power-profiles of the genuine and maligned ICs that is magnified above the process variation
ensuring that the discrepancies are observable.
Master of Science
Amsaad, Fathi Hassan Mohamed. "A Trusted and Efficient Security Approach for the Detection of Hardware Trojans and Authentication of FPGA-based Systems." University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1512494875469127.
Full textWeidler, Nathanael R. "Built-In Return-Oriented Programs in Embedded Systems and Deep Learning for Hardware Trojan Detection." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7620.
Full textHarris, Matthew Joshua. "Accelerating Reverse Engineering Image Processing Using FPGA." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright155535529307322.
Full textBowman, David C. "Image Stitching and Matching Tool in the Automated Iterative Reverse Engineer (AIRE) Integrated Circuit Analysis Suite." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1533766175549951.
Full textHill, Jeremy Michael Olivar. "Detection of Avionics Supply Chain Non-control-flow Malware Using Binary Decompilation and Wavelet Analysis." University of Dayton / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1628159084278194.
Full textBooks on the topic "Detection of Trojans"
Elizabeth, Peters. Trojan gold: A Vicky Bliss mystery. Thorndike, Me: Thorndike Press, 1987.
Find full textPeters, Elizabeth. Trojan gold: A Vicky Bliss mystery. Thorndike, Me: Thorndike Press, 1987.
Find full textElizabeth, Peters, and Elizabeth Peters. Trojan gold: A Vicky Bliss mystery. New York: Atheneum, 1987.
Find full textSalmani, Hassan, Mohammad Tehranipoor, and Xuehui Zhang. Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection. Springer, 2016.
Find full textBook chapters on the topic "Detection of Trojans"
Salmani, Hassan. "Design Techniques for Hardware Trojans Prevention and Detection at the Gate Level." In Trusted Digital Circuits, 49–67. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79081-7_5.
Full textSalmani, Hassan. "Design Techniques for Hardware Trojans Prevention and Detection at the Layout Level." In Trusted Digital Circuits, 93–107. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79081-7_7.
Full textCrandall, Jedidiah R., John Brevik, Shaozhi Ye, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, S. Felix Wu, and Frederic T. Chong. "Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection." In Transactions on Computational Science IV, 244–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01004-0_14.
Full textSalmani, Hassan. "Design Techniques for Hardware Trojans Prevention and Detection at the Register-Transfer Level." In Trusted Digital Circuits, 31–38. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79081-7_3.
Full textTang, Yongkang, Jianye Wang, Shaoqing Li, Jihua Chen, and Binbin Yang. "Microsecond-Level Temperature Variation of Logic Circuits and Influences of Infrared Cameras’ Parameters on Hardware Trojans Detection." In Communications in Computer and Information Science, 69–80. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-3159-5_7.
Full textNarasimhan, Seetharam, and Swarup Bhunia. "Hardware Trojan Detection." In Introduction to Hardware Security and Trust, 339–64. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-8080-9_15.
Full textDavoodi, Azadeh. "Golden-Free Trojan Detection." In The Hardware Trojan War, 203–15. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68511-3_9.
Full textBao, Chongxi, Yang Xie, Yuntao Liu, and Ankur Srivastava. "Reverse Engineering-Based Hardware Trojan Detection." In The Hardware Trojan War, 269–88. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68511-3_11.
Full textGovindan, Vidya, and Rajat Subhra Chakraborty. "Logic Testing for Hardware Trojan Detection." In The Hardware Trojan War, 149–82. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68511-3_7.
Full textMarchette, David J. "Trojan Programs and Covert Channels." In Computer Intrusion Detection and Network Monitoring, 241–55. New York, NY: Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4_7.
Full textConference papers on the topic "Detection of Trojans"
Vashistha, Nidish, Hangwei Lu, Qihang Shi, M. Tanjidur Rahman, Haoting Shen, Damon L. Woodard, Navid Asadizanjani, and Mark Tehranipoor. "Trojan Scanner: Detecting Hardware Trojans with Rapid SEM Imaging Combined with Image Processing and Machine Learning." In ISTFA 2018. ASM International, 2018. http://dx.doi.org/10.31399/asm.cp.istfa2018p0256.
Full textZhou, Xinzhe, Wenhao Jiang, Sheng Qi, and Yadong Mu. "Multi-Target Invisibly Trojaned Networks for Visual Recognition and Detection." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/477.
Full textMeade, Travis, Shaojie Zhang, Yier Jin, Zheng Zhao, and David Pan. "Gate-Level Netlist Reverse Engineering Tool Set for Functionality Recovery and Malicious Logic Detection." In ISTFA 2016. ASM International, 2016. http://dx.doi.org/10.31399/asm.cp.istfa2016p0342.
Full textBaktir, Selcuk, Tansal Gucluoglu, Atilla Ozmen, Huseyin Fuat Alsan, and Mustafa Can Macit. "Detection of Trojans in integrated circuits." In 2012 International Symposium on Innovations in Intelligent Systems and Applications (INISTA). IEEE, 2012. http://dx.doi.org/10.1109/inista.2012.6246941.
Full textKumar, Nitesh, Vinay Kumar, and Manish Gaur. "Banking Trojans APK Detection using Formal Methods." In 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2019. http://dx.doi.org/10.1109/iscon47742.2019.9036319.
Full textRahimifar, Mohammad Mehdi, and Hadi Jahanirad. "Employing Image Processing Techniques for Hardware Trojans Detection." In 2020 10th International Conference on Computer and Knowledge Engineering (ICCKE). IEEE, 2020. http://dx.doi.org/10.1109/iccke50421.2020.9303654.
Full textKarabacak, Fatih, Richard Welker, Matthew J. Casto, Jennifer N. Kitchen, and Sule Ozev. "RF circuit authentication for detection of process Trojans." In 2018 IEEE 36th VLSI Test Symposium (VTS). IEEE, 2018. http://dx.doi.org/10.1109/vts.2018.8368666.
Full textMcGuire, Matthew, Umit Ogras, and Sule Ozev. "PCB Hardware Trojans: Attack Modes and Detection Strategies." In 2019 IEEE 37th VLSI Test Symposium (VTS). IEEE, 2019. http://dx.doi.org/10.1109/vts.2019.8758643.
Full textSoll, Oliver, Thomas Korak, Michael Muehlberghuber, and Michael Hutter. "EM-based detection of hardware trojans on FPGAs." In 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). IEEE, 2014. http://dx.doi.org/10.1109/hst.2014.6855574.
Full textZhao, Zhixun, Lin Ni, Shaoqing Li, and Yubo Shi. "A Feature Extraction Method for Hardware Trojans Detection." In 2015 International Conference on Automation, Mechanical Control and Computational Engineering. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/amcce-15.2015.307.
Full text