all InfoSec news
Logic and Reduction Operation based Hardware Trojans in Digital Design. (arXiv:2209.04484v1 [cs.CR])
Sept. 13, 2022, 1:20 a.m. | Mayukhmali Das, Sounak Dutta, Sayan Chatterjee
cs.CR updates on arXiv.org arxiv.org
In this paper, we will demonstrate Hardware Trojan Attacks on four different
digital designs implemented on FPGA. The hardware trojan is activated based on
special logical and reduction-based operations on vectors which makes the
trojan-activity as silent and effective as possible. In this paper, we have
introduced 5 novel trojan attack methodologies.
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Technical Writer Cybersecurity (Clearance Required)
@ ICF | Virginia Client Office (VA88)
Threat Management & Intelligence Expert (m/f/d)
@ METRO/MAKRO | Düsseldorf, Germany
IT Security Manager
@ Deutsche Telekom IT Solutions Slovakia | Košice, Slovakia (Slovak Republic)