all InfoSec news
Logic and Reduction Operation based Hardware Trojans in Digital Design. (arXiv:2209.04484v2 [cs.CR] UPDATED)
Oct. 26, 2022, 1:24 a.m. | Mayukhmali Das, Sounak Dutta, Sayan Chatterjee
cs.CR updates on arXiv.org arxiv.org
In this paper, we will demonstrate Hardware Trojan Attacks on four different
digital designs implemented on FPGA. The hardware trojan is activated based on
special logical and reduction-based operations on vectors which makes the
trojan-activity as silent and effective as possible. In this paper, we have
introduced 5 novel trojan attack methodologies.
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Information Systems Security Officer (ISSO), Junior
@ Dark Wolf Solutions | Remote / Dark Wolf Locations
Cloud Security Engineer
@ ManTech | REMT - Remote Worker Location
SAP Security & GRC Consultant
@ NTT DATA | HYDERABAD, TG, IN
Security Engineer 2 - Adversary Simulation Operations
@ Datadog | New York City, USA