Filters








227 Hits in 6.7 sec

A Survey of Hardware Trojan Taxonomy and Detection

Mohammad Tehranipoor, Farinaz Koushanfar
2010 IEEE Design & Test of Computers  
Acknowledgments We thank Yousra Alkabani, Mehrdad Majzoobi, Hassan Salmani, Michel Wang, and Xhehui Zhang from Rice University and the University of Connecticut, Storrs, for their contributions to this  ...  Trojan detection using side-channel signal analysis Side-channel signals, including timing and power, can be used for Trojan detection.  ...  This method can help detect Trojans in two ways: It can improve power-based side-channel signal analysis methods by increasing the number of transitions in Trojans.  ... 
doi:10.1109/mdt.2010.7 fatcat:sp63pjktojhylcr3gqfjin7msy

A Survey of Hardware Trojan Taxonomy and Detection

Mohammad Tehranipoor, Farinaz Koushanfar
2013 IEEE design & test  
Acknowledgments We thank Yousra Alkabani, Mehrdad Majzoobi, Hassan Salmani, Michel Wang, and Xhehui Zhang from Rice University and the University of Connecticut, Storrs, for their contributions to this  ...  Trojan detection using side-channel signal analysis Side-channel signals, including timing and power, can be used for Trojan detection.  ...  This method can help detect Trojans in two ways: It can improve power-based side-channel signal analysis methods by increasing the number of transitions in Trojans.  ... 
doi:10.1109/mdt.2009.159 fatcat:dro6wp2igfahvf72qqedrf26ui

Practical measurements of data path delays for IP authentication & integrity verification

Ingrid Exurville, Jacques Fournier, Jean-Max Dutertre, Bruno Robisson, Assia Tria
2013 2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC)  
We illustrate how the measured path delays can constitute a characteristic fingerprint of an Intellectuel Property (IP) and can be used to detect the insertion of hardware trojans.  ...  Compared to trojan detection schemes based on path delay characterisations already proposed in the literature, our approach does not require any additional test circuit to be inserted in the IP.  ...  ACKNOWLEDGMENT This work is supported by the DGA (Délégation Générale de l'Armement, Paris, France) and the HOMERE project (Hardware trOjans : Menaces et robustEsse des ciRcuits In-tEgrés, FUI 14).  ... 
doi:10.1109/recosoc.2013.6581551 dblp:conf/recosoc/ExurvilleFDRT13 fatcat:mmbifb7q4jfwfh7cslwsdhrnii

Security Vulnerabilities Against Fingerprint Biometric System [article]

Mahesh Joshi, Bodhisatwa Mazumdar, Somnath Dey
2018 arXiv   pre-print
This paper provides an overview of the fingerprint biometric system and gives details about various current security aspects related to the system.  ...  Due to the high efficiency of fingerprint biometric system in verifying a legitimate user, numerous government and private organizations are using this system for security purpose.  ...  The adversary sends commands to the Trojan horse to send the feature set selected by him.  ... 
arXiv:1805.07116v1 fatcat:id7chc2hi5bszf3cszijf2bdp4

Malware Analysis in IoT & Android Systems with Defensive Mechanism

Chandra Shekhar Yadav, Jagendra Singh, Aruna Yadav, Himansu Sekhar Pattanayak, Ravindra Kumar, Arfat Ahmad Khan, Mohd Anul Haq, Ahmed Alhussen, Sultan Alharby
2022 Electronics  
This article attempts to provide a relative analysis of several malware detection methods in the different environments of attacks.  ...  Android devices connect to different IoT devices such as IoT-enabled cameras, Alexa powered by Amazon, and various other sensors.  ...  Ethical Approval: This article does not contain any studies with human participants performed by any of the authors.  ... 
doi:10.3390/electronics11152354 fatcat:saf2a2bb6rdznkbgdukxb3s4fe

Proof-of-concept of real-world quantum key distribution with quantum frames

I Lucio-Martinez, P Chan, X Mo, S Hosier, W Tittel
2009 New Journal of Physics  
In addition, this method also provides a platform to communicate implementation specific information such as encoding and protocol in view of future optical quantum networks.  ...  This allows synchronization, sender and receiver identification, and compensation of time-varying birefringence in the communication channel.  ...  Acknowledgments This work is supported by General Dynamics Canada, Alberta's Informatics Circle of Research Excellence (iCORE), the National Science and Engineering Research Council of Canada (NSERC),  ... 
doi:10.1088/1367-2630/11/9/095001 fatcat:2zevnk6er5ahtlkshc5no3yauy

Securing e-Government and e-Voting with an open cloud computing architecture

Dimitrios Zissis, Dimitrios Lekkas
2011 Government Information Quarterly  
From an Information and Communication Security perspective, a structured analysis is adopted to identify vulnerabilities, involved in the digitalization of government transactions and the electoral process  ...  Taking a step further, this paper proposes a high level electronic governance and electronic voting solution, supported by cloud computing architecture and cryptographic technologies, additionally identifying  ...  , worms, malicious mobile code, Trojan horses, rootkits, and spyware.  ... 
doi:10.1016/j.giq.2010.05.010 fatcat:7s7bumeycjbfnppjnnvu3jdloi

Advancements in Cyber Attacks and Security

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Cyber security is swiftly transforming into an article of everyday usage.  ...  It is a direct indication to how important cyber security is considering the prolonging effect and enormous expansion caused by such events in recent years.  ...  Trojan Horse Trojan is a sort of malware that gives unapproved access to touchy communications of the clients, for example, buy exchanges, premium rate calls, and so on out of sight of the unfortunate  ... 
doi:10.35940/ijitee.d1678.029420 fatcat:rpgoz4okmvelnnd2evrlypod7i

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection

Luca Caviglione, Michal Choras, Igino Corona, Artur Janicki, Wojciech Mazurczyk, Marek Pawlicki, Katarzyna Wasielewska
2020 IEEE Access  
That is why, in this paper we first perform a detailed meta-review of the existing surveys related to malware and its detection techniques, showing an arms race between these two sides of a barricade.  ...  Next, we present the bird's eye view portraying the main development trends in detection methods with a special emphasis on the machine learning techniques.  ...  For this reason, a side-channel data acquisition using hardware method was proposed. F.  ... 
doi:10.1109/access.2020.3048319 fatcat:tatdk6pzczgp3aylvbxoxabuta

Secure quantum key distribution with realistic devices [article]

Feihu Xu, Xiongfeng Ma, Qiang Zhang, Hoi-Kwong Lo, Jian-Wei Pan
2020 arXiv   pre-print
Can quantum code-breakers successfully hack real systems by exploiting the side channels? Can quantum code-makers design innovative counter-measures to foil quantum code-breakers?  ...  Recent advances, such as the measurement-device-independent protocol, have closed the critical side channels in the physical implementations, paving the way for secure QKD with realistic devices.  ...  account in security analysis.  ... 
arXiv:1903.09051v3 fatcat:6avz57mdzzhxni35bqy5vrzk3a

Mitigating Botnet Attack Using Encapsulated Detection Mechanism (EDM) [article]

Maxwell Scale Uwadia Osagie, C. I. Okoye, Amenze Joy Osagie
2018 arXiv   pre-print
Botnet as it is popularly called became fashionable in recent times owing to it embedded force on network servers.  ...  Nigeria as a country loses above one hundred and twenty five (N125) billion naira to network fraud annually, end users such as Banks and other financial institutions battle daily the botnet threats.  ...  Bot-master can disperse command to its botnet by the use of the IRC C&C channel. It has been showed that most botnets use the IRC for C&C processes.  ... 
arXiv:1806.06275v1 fatcat:sitripvm4zglhmmoosh2k6ugdy

Mitigating Botnet Attack Using Encapsulated Detection Mechanism (EDM)

Maxwell Scale Uwadia Osagie, C. I. Okoye, Amenze Joy Osagie
2018 Asian Journal of Research in Computer Science  
It is on the above premise that this paper sort to expose the botnet method of propagation through proactive mechanism called Encapsulated Detection Mechanism (EDM) for botnet on Server Systems with further  ...  The mechanism uses one dimensional data stream evolutionary window approach of Distance Base Model (DBM) as an Outlier Analysis (OA).  ...  Bot-master can disperse command to its botnet by the use of the IRC C&C channel. It has been showed that most botnets use the IRC for C&C processes.  ... 
doi:10.9734/ajrcos/2018/v1i224731 fatcat:gqkpdu44ynbsziuy6mf4ntanmm

IOT Security Threats and Block Chain based Solutions

2019 International journal of recent technology and engineering  
In future IoT is expected to be effortlessly integrated into our environment and human will be solely dependent on this technology for comfort and easy life style.  ...  In future IoT is expected to be effortlessly integrated into our environment and human will be solely dependent on this technology for comfort and easy life style.  ...  Trojan horses, Worms and viruses are some of the dangerous malwares used by individual to exploit a system [24] .  ... 
doi:10.35940/ijrte.b1034.0782s519 fatcat:unx6ipmi3zdkjgw6jbeo6fe4vq

INDUSTRIAL INTERNET OF THINGS VULNERABILITIES AND THREATS: WHAT STAKEHOLDERS NEED TO CONSIDER

2019 Issues in Information Systems  
The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices into industrial process systems operating in the energy, transportation, healthcare, utilities, cities, agriculture, and  ...  a comprehensive, systematic, and layer-appropriate approach to IIoT security.  ...  A third type of RF attack, known as side channel, is more passive in nature.  ... 
doi:10.48009/1_iis_2019_119-133 fatcat:6beomruswrf3thwzbvrkb7cxny

A Comprehensive Review of Cybersecurity in Inverter-based Smart Power System amid the Boom of Renewable Energy

Nguyen Duc Tuyen, Nguyen Sy Quan, Vo Ba Linh, Tuyen V. Vu, Goro Fujita
2022 IEEE Access  
such as cyberattacks by hackers.  ...  However, due to the deep information and communication technology (ICT) infrastructure implementation that most inverter-based smart power systems tend to have, they are vulnerable to severe external threats  ...  the drafting of this study, also special thanks to Hoang Nhat for his help in designing and drawing beautiful figures for this journal and Le Ngoc Dung for his help in data analysis and classification  ... 
doi:10.1109/access.2022.3163551 fatcat:adylc72usbenzb6awm3pyqiyri
« Previous Showing results 1 — 15 out of 227 results