|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 122 occurrences of 104 keywords
|
|
|
Results
Found 1182 publication records. Showing 1165 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
253 | Mohammad Tehranipoor, Farinaz Koushanfar |
A Survey of Hardware Trojan Taxonomy and Detection. |
IEEE Des. Test Comput. |
2010 |
DBLP DOI BibTeX RDF |
hardware Trojans, Trojan taxonomy and detection, security, design and test, ICs |
115 | Francis G. Wolff, Christos A. Papachristou, Swarup Bhunia, Rajat Subhra Chakraborty |
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme. |
DATE |
2008 |
DBLP DOI BibTeX RDF |
|
94 | Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne P. Burleson |
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
Trojan Hardware, Trojan Side-Channel, Hardware Trojan Detection, Covert Channel, Side-Channel Analysis |
86 | Rajat Subhra Chakraborty, Francis G. Wolff, Somnath Paul, Christos A. Papachristou, Swarup Bhunia |
MERO: A Statistical Approach for Hardware Trojan Detection. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
|
86 | Susmit Jha, Sumit Kumar Jha 0001 |
Randomization Based Probabilistic Approach to Detect Trojan Circuits. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
86 | Yier Jin, Yiorgos Makris |
Hardware Trojan Detection Using Path Delay Fingerprint. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
72 | Daeyeon Park, Rafael H. Saavedra |
Trojan: A High-Performance Simulator for Shared Memory Architectures. |
Annual Simulation Symposium |
1996 |
DBLP DOI BibTeX RDF |
virtual-memory simulation, application annotation, execution-driven simulation, copy-on-write |
65 | Miodrag Potkonjak, Ani Nahapetian, Michael Nelson 0002, Tammara Massey |
Hardware Trojan horse detection using gate-level characterization. |
DAC |
2009 |
DBLP DOI BibTeX RDF |
Hardware Trojan horses, gate-level characterization, linear programming, manufacturing variability |
58 | Reza M. Rad, Xiaoxiao Wang 0001, Mohammad Tehranipoor, Jim Plusquellic |
Power supply signal calibration techniques for improving detection resolution to hardware Trojans. |
ICCAD |
2008 |
DBLP DOI BibTeX RDF |
|
58 | Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang |
Trojan horse resistant discretionary access control. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
access control, operating system, information flow |
58 | Rajat Subhra Chakraborty, Somnath Paul, Swarup Bhunia |
On-Demand Transparency for Improving Hardware Trojan Detectability. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
58 | Xiaoxiao Wang 0001, Hassan Salmani, Mohammad Tehranipoor, James F. Plusquellic |
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis. |
DFT |
2008 |
DBLP DOI BibTeX RDF |
|
58 | Dakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar |
Trojan Detection using IC Fingerprinting. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Chain-Wu Lee, Chun-Hsi Huang, Sanguthevar Rajasekaran |
TROJAN: A Scalable Distributed Semantic Network System. |
ICTAI |
2003 |
DBLP DOI BibTeX RDF |
|
58 | Eun-Sun Cho, Sunho Hong, Sechang Oh, Hongjin Yeh, Manpyo Hong, Cheol Won Lee, Hyundong Park, Chun-Sik Park |
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
51 | Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, John Kelsey |
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Herding attack, Trojan message attack, Zipper hash, Concatenated hash, Tree hash, Second preimage attack |
43 | Mainak Banga, Michael S. Hsiao |
A Region Based Approach for the Identification of Hardware Trojans. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Jinye Peng, GuangQiang He, Jin Xiong, Guihua Zeng |
Trojan Horse Attack Strategy on Quantum Private Communication. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Micha Moffie, Winnie Cheng, David R. Kaeli, Qin Zhao |
Hunting Trojan Horses. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
information flow control, program monitoring, run time environment, data labeling |
36 | Sheng Wei 0001, Saro Meguerdichian, Miodrag Potkonjak |
Gate-level characterization: foundations and hardware security applications. |
DAC |
2010 |
DBLP DOI BibTeX RDF |
gate-level characterization, hardware Trojan horse, thermal conditioning, manufacturing variability |
36 | Patrick Schaumont, Alex K. Jones, Steve Trimberger |
Guest Editors' Introduction to Security in Reconfigurable Systems Design. |
ACM Trans. Reconfigurable Technol. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Trojan, Trustworthy design, side-channel resistant design, physically unclonable function |
36 | Mainak Banga, Maheshwar Chandrasekar, Lei Fang 0002, Michael S. Hsiao |
Guided test generation for isolation and detection of embedded trojans in ics. |
ACM Great Lakes Symposium on VLSI |
2008 |
DBLP DOI BibTeX RDF |
trojan |
36 | Muazzam Siddiqui, Morgan C. Wang, Joohan Lee |
Detecting Trojans Using Data Mining Techniques. |
IMTIC |
2008 |
DBLP DOI BibTeX RDF |
Trojan Detection, Data Mining, Support Vector Machines, Principal Component Analysis, Random Forest, Disassembly |
36 | Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu |
Hacking Tricks Toward Security on Network Environments. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing |
36 | Sharon R. Lewis, Simon R. Wiseman |
Securing an Object Relational Database. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
bject-oriented databases, object relational database security, Trojan Horse software, business constraints, accounting information, risks, COTS, commercial off the shelf, data access, security labelling |
36 | R. E. Niemeyer |
Using Web Technologies in Two MLS Environments: A Security Analysis. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks |
36 | John Clark 0002, Sylvain P. Leblanc, Scott Knight |
Hardware Trojan Horse Device Based on Unintended USB Channels. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
Hardware Trojan Horse Device, Unintended USB Channel |
36 | John P. McDermott |
Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks. |
Workshop on New Security Paradigms |
1998 |
DBLP DOI BibTeX RDF |
trojan horse, security, integrity, storage |
34 | J. A. Guerrero-Vargas, L. Carvalho Trojan, Estevam Barbosa de Las Casas, Diego Alexander Garzón-Alvarado |
Finite element analysis of the influence of interdigitation pattern and collagen fibers on the mechanical behavior of the midpalatal suture. |
Medical Biol. Eng. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
34 | Bilkis Mitu, Václav Trojan, Lenka Halámková |
Sex Determination of Human Nails Based on Attenuated Total Reflection Fourier Transform Infrared Spectroscopy in Forensic Context. |
Sensors |
2023 |
DBLP DOI BibTeX RDF |
|
34 | Lenon Diniz Seixas, Fernanda Cristina Corrêa, Hugo Valadares Siqueira, Flavio Trojan, Paulo Afonso |
Vehicle Industry Big Data Analysis Using Clustering Approaches. |
OL2A (2) |
2023 |
DBLP DOI BibTeX RDF |
|
34 | Hans Friedrich Witschel, Emanuele Laurenzi, Stephan Jüngling, Y. Kadvany, A. Trojan |
An Early Warning System that combines Machine Learning and a Rule-Based Approach for the Prediction of Cancer Patients' Unplanned Visits. |
AAAI Spring Symposium: MAKE |
2023 |
DBLP BibTeX RDF |
|
34 | Grzegorz Swiderski, Bartosz Trojan |
About essential spectra of unbounded Jacobi matrices. |
J. Approx. Theory |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Grzegorz Swiderski, Bartosz Trojan |
Asymptotic behavior of Christoffel-Darboux kernel via three-term recurrence relation II. |
J. Approx. Theory |
2021 |
DBLP DOI BibTeX RDF |
|
34 | Olaf Brandt, Holger Gauza, Steve Kaminski, Mario Trojan, Thorsten Trippel, Johannes Werner |
Extending the CMDI Universe Metadata for Bioinformatics Data. |
CLARIN Annual Conference |
2020 |
DBLP BibTeX RDF |
|
34 | Bruno Samways dos Santos, Maria Teresinha Arns Steiner, Amanda Trojan Fenerich, Rafael Henrique Palma Lima |
Data mining and machine learning techniques applied to public health problems: A bibliometric analysis from 2009 to 2018. |
Comput. Ind. Eng. |
2019 |
DBLP DOI BibTeX RDF |
|
34 | Przemyslaw Trojan |
Agent-based provision of system services. |
|
2019 |
RDF |
|
34 | Eric Glende, Przemyslaw Trojan, Ines Hauer, André Naumann, Christoph Brosinsky, Martin Wolter, Dirk Westermann |
Communication Infrastructure for Dynamic Grid Control Center with a Hardware-in-the-Loop Model. |
ISGT Europe |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Jack Brooks, Jörg Trojan |
The Cutaneous Rabbit Effect: Phenomenology and saltation. |
Scholarpedia |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Grzegorz Swiderski, Bartosz Trojan |
Periodic perturbations of unbounded Jacobi matrices I: Asymptotics of generalized eigenvectors. |
J. Approx. Theory |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Karol Korczak, Anna Kasielska-Trojan, Marian Niedzwiedzinski, Boguslaw Antoszewski |
A computer-supported management of photographic documentation in plastic surgery - System development and its clinical application. |
Comput. Biol. Medicine |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Farnood Gholami, Daria A. Trojan, József Kövecses, Wassim M. Haddad, Behnood Gholami |
A Microsoft Kinect-Based Point-of-Care Gait Assessment Framework for Multiple Sclerosis Patients. |
IEEE J. Biomed. Health Informatics |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Pavel Taraba, Jakub Trojan, Veronika Kavkova |
Development of the knowledge system based on formation of holistic competence of project managers in the Czech Republic. |
CSIT (2) |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Stefan Oberhoff, Kay Goetz, Karin Trojan, Martin Zoeller, Joachim Glueck |
Application of high frequency scanning acoustic microscopy for the failure analysis and reliability assessment of MEMS sensors. |
Microelectron. Reliab. |
2016 |
DBLP DOI BibTeX RDF |
|
34 | Farnood Gholami, Daria A. Trojan, József Kövecses, Wassim M. Haddad, Behnood Gholami |
Gait Assessment for Multiple Sclerosis Patients Using Microsoft Kinect. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
34 | Matheus Trevisan Moreira, Guilherme Trojan, Fernando Gehm Moraes, Ney Laert Vilar Calazans |
Spatially Distributed Dual-Spacer Null Convention Logic Design. |
J. Low Power Electron. |
2014 |
DBLP DOI BibTeX RDF |
|
34 | Stefan Engelen, Ladislas A. Trojan, Sophie Sacquin-Mora, Richard Lavery, Alessandra Carbone |
Joint Evolutionary Trees: A Large-Scale Method To Predict Protein Interfaces Based on Sequence Sampling. |
PLoS Comput. Biol. |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Rupert Hölzl 0002, Jörg Trojan, Dieter Kleinböhl |
Dynamic Perceptual Maps - A Psychophysical Approach to Spatiotemporal Interactions and Plasticity in Body Perception. |
WHC |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Zdenek Trefny, J. Svacinka, S. Trojan, J. Slavicek, Pavel Smrcka, Martin Trefny |
Automatic Evaluation of the Quantitative Seismocardiogram. |
ICEIS (2) |
2007 |
DBLP BibTeX RDF |
|
34 | Zdenek Trefny, J. Svacinka, S. Trojan, J. Slavicek, Pavel Smrcka, Karel Hána |
A new method for the evaluation of the signal acquired from quantitative seismocardiograph - hardware and software solution for the new field of monitoring heart activity. |
ICINCO-SPSMC |
2006 |
DBLP BibTeX RDF |
|
34 | Madan M. Gupta, Jerzy B. Kiszka, George M. Trojan |
Multivariable Structure of Fuzzy Control Systems. |
IEEE Trans. Syst. Man Cybern. |
1986 |
DBLP DOI BibTeX RDF |
|
34 | Madan M. Gupta, George M. Trojan, Jerzy B. Kiszka |
Controllability of Fuzzy Control Systems. |
IEEE Trans. Syst. Man Cybern. |
1986 |
DBLP DOI BibTeX RDF |
|
34 | George M. Trojan |
Lower Bounds and Fast Algorithms for Sequence Acceleration. |
J. ACM |
1984 |
DBLP DOI BibTeX RDF |
|
29 | Mainak Banga, Michael S. Hsiao |
A Novel Sustained Vector Technique for the Detection of Hardware Trojans. |
VLSI Design |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Reza M. Rad, Jim Plusquellic, Mohammad Tehranipoor |
Sensitivity Analysis to Hardware Trojans using Power Supply Transient Signals. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Xiaoxiao Wang 0001, Mohammad Tehranipoor, Jim Plusquellic |
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Adam L. Young, Moti Yung |
Malicious Cryptography: Kleptographic Aspects. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP |
29 | Yongwha Chung, Daesung Moon, Taehae Kim, Sung Bum Pan |
A Secure Fingerprint Authentication System on an Untrusted Computing Environment. |
TrustBus |
2005 |
DBLP DOI BibTeX RDF |
Untrusted Clients, Embedded Sensors, Biometrics, Fingerprint Verification |
29 | Brian D. Carrier, Blake Matheny |
Methods for Cluster-Based Incident Detection. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Jonathan T. Trostle |
Timing Attacks Against Trusted Path. |
S&P |
1998 |
DBLP DOI BibTeX RDF |
|
29 | Elisa Bertino, Pierangela Samarati, Sushil Jajodia |
High Assurance Discretionary Access Control for Object Bases. |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
29 | Myong H. Kang, Ira S. Moskowitz |
A Pump for Rapid, Reliable, Secure Communication. |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
29 | Francis G. Wolff, Christos A. Papachristou |
An Embedded Flash Memory Vault for Software Trojan Protection. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Yousra Alkabani, Farinaz Koushanfar |
Designer's Hardware Trojan Horse. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jie Li, John C. Lach |
At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Michael Franz |
Containing the Ultimate Trojan Horse. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Ryotaro Negishi, Tatsuki Kurihara, Nozomu Togawa |
Hardware-Trojan Detection at Gate-Level Netlists Using a Gradient Boosting Decision Tree Model and Its Extension Using Trojan Probability Propagation. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
29 | Satyaki Nan, Swastik Brahma |
Hardware Trojan Testing with Hierarchical Trojan Types Under Cognitive Biases. |
CISS |
2024 |
DBLP DOI BibTeX RDF |
|
29 | Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy |
Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Vedika Saravanan, Mohammad Walid Charrwi, Samah Mohamed Saeed |
Revisiting Trojan Insertion Techniques for Post-Silicon Trojan Detection Evaluation. |
ISVLSI |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Tatsuki Kurihara, Nozomu Togawa |
Hardware-Trojan Detection Based on the Structural Features of Trojan Circuits Using Random Forests. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Hassan Salmani, Mark M. Tehranipoor, Sarwono Sutikno, Fajar Wijitrisnanto |
Trust-Hub Trojan Benchmark for Hardware Trojan Detection Model Creation using Machine Learning. |
|
2022 |
DOI RDF |
|
29 | Kento Hasegawa, Tomotaka Inoue, Nozomu Togawa |
A Two-Stage Hardware Trojan Detection Method Considering the Trojan Probability of Neighbor Nets. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Jiaji He, Haocheng Ma, Yanjiang Liu, Yiqiang Zhao |
Golden Chip-Free Trojan Detection Leveraging Trojan Trigger's Side-Channel Fingerprinting. |
ACM Trans. Embed. Comput. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Swastik Brahma, Satyaki Nan, Laurent Njilla |
Strategic Hardware Trojan Testing with Hierarchical Trojan Types. |
CISS |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Qiang Liu 0011, Pengyong Zhao, Fuqiang Chen |
A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Mohammad Nasim Imtiaz Khan, Asmit De, Swaroop Ghosh |
RF-Trojan: Leaking Kernel Data Using Register File Trojan. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
29 | Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm 0002, Paul Martin Knopp, Christof Paar |
Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
29 | Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm 0002, Paul Martin Knopp, Christof Paar |
Insights into the mind of a trojan designer: the challenge to integrate a trojan into the bitstream. |
ASP-DAC |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Kento Hasegawa, Masao Yanagisawa, Nozomu Togawa |
Trojan-Net Feature Extraction and Its Application to Hardware-Trojan Detection for Gate-Level Netlists Using Random Forest. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Kento Hasegawa, Masao Yanagisawa, Nozomu Togawa |
A Hardware-Trojan Classification Method Using Machine Learning at Gate-Level Netlists Based on Trojan Features. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Kento Hasegawa, Masao Yanagisawa, Nozomu Togawa |
Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier. |
ISCAS |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Masaru Oya, Youhua Shi, Masao Yanagisawa, Nozomu Togawa |
In-situ Trojan authentication for invalidating hardware-Trojan functions. |
ISQED |
2016 |
DBLP DOI BibTeX RDF |
|
29 | K. Sudeendra Kumar, Rakesh Chanamala, Sauvagya Ranjan Sahoo, Kamala Kanta Mahapatra |
An improved AES Hardware Trojan benchmark to validate Trojan detection schemes in an ASIC design flow. |
VDAT |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Michael Muehlberghuber, Frank K. Gürkaynak, Thomas Korak, Philipp Dunst, Michael Hutter |
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC. |
HASP@ISCA |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic |
A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. |
IEEE Trans. Very Large Scale Integr. Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic |
New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Quyen L. Nguyen, Arun Sood |
A Comparison of Intrusion-Tolerant System Architectures. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
D.0 General, D.2.4.d Formal methods, D.4.6.a Access controls, D.4.6.b Authentication, K.4.4.f Security, K.4.4.g Internet security policies, K.6.5.a Authentication, K.6.5.c Invasive software (viruses, worms, Trojan horses), K.6.5.e Unauthorized access (hacking, phreaking), K.6.m.b Security, C.4.f Reliability, D.2.9.m Risk management, D.4.5.e High availability, D.4.6.d Information flow controls, Data exfiltration, Intrusion Tolerance, availability and serviceability |
22 | Mohammad Tehranipoor, Farinaz Koushanfar |
Guest Editors' Introduction: Confronting the Hardware Trustworthiness Problem. |
IEEE Des. Test Comput. |
2010 |
DBLP DOI BibTeX RDF |
hardware Trojans, Trojan attack, design and test, security measures, secret key, IP protection |
22 | Yier Jin, Yiorgos Makris |
Hardware Trojans in Wireless Cryptographic ICs. |
IEEE Des. Test Comput. |
2010 |
DBLP DOI BibTeX RDF |
hardware Trojan, wireless cryptographic IC, statistical analysis, design and test |
22 | Michael Nelson 0002, Ani Nahapetian, Farinaz Koushanfar, Miodrag Potkonjak |
SVD-Based Ghost Circuitry Detection. |
Information Hiding |
2009 |
DBLP DOI BibTeX RDF |
Hardware Trojan horses, gate characterization, singular value decomposition, manufacturing variability |
22 | Xuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford |
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
(viruses, worms, Trojan horses), Servers, Security and Protection |
22 | Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi |
Modeling and Automated Containment of Worms. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
(viruses, worms, Trojan horses), (Internet scanning worms), (stochastic worm modeling), (branching process model), (preference scanning worms), (automatic worm containment) |
22 | Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia |
Information Flow Control in Object-Oriented Systems. |
IEEE Trans. Knowl. Data Eng. |
1997 |
DBLP DOI BibTeX RDF |
Object-oriented databases and systems, Trojan horse, security, distributed processing, mandatory access control, discretionary access control |
14 | N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar |
Can we certify systems for freedom from malware. |
ICSE (2) |
2010 |
DBLP DOI BibTeX RDF |
|
14 | Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat |
Static CFG analyzer for metamorphic Malware code. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
metamorphic malware, normalization, obfuscation, control flow graph, longest common subsequence |
14 | S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq |
Malware detection using statistical analysis of byte-level file content. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
computer malware, data mining, forensics |
14 | Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer Jr., Jungha Woo, Elisa Bertino |
Privacy-preserving management of transactions' receipts for mobile environments. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
registrar, transaction record, privacy |
14 | Asia Slowinska, Herbert Bos |
Pointless tainting?: evaluating the practicality of pointer tainting. |
EuroSys |
2009 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, pointer tainting |
14 | George Lawton |
Is It Finally Time to Worry about Mobile Malware? |
Computer |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1165 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|