• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 53
  • 9
  • 8
  • 7
  • 6
  • 5
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 120
  • 26
  • 26
  • 25
  • 24
  • 24
  • 18
  • 16
  • 15
  • 13
  • 11
  • 10
  • 10
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Cloud Based IP Data Management Theory and Implementation for a Secure and Trusted Design Space

Heaton, Tyler DeVoe 26 August 2019 (has links)
No description available.
72

Bio-Inspired Hardware Security Defenses: A CRISPR-Cas-Based Approach for Detecting Trojans in FPGA Systems

Staub, Dillon 24 October 2019 (has links)
No description available.
73

ReRAM based platform for monitoring IC integrity and aging

Schultz, Thomas January 2019 (has links)
No description available.
74

Testing and Security Considerations in Presence of Process Variations

Shanyour, Basim 01 May 2020 (has links) (PDF)
Process variations is one of the most challenging phenomena in deep submicron. Delay fault testing becomes more complicated because gate delays are not fixed but instead, they are statistical quantities due to the variations in the transistor characteristics. On the other hand, testing for hardware Trojan is also challenging in the presence of process variations because it can easily mask the impact of the inserted Trojan. This work consists of two parts. In the first part, an approach to detect ultra-low-power no-payload Trojans by analyzing IDDT waveforms at each gate in the presence of process variations is presented. The approach uses a novel ATPG to insert a small number of current sensors to analyze the behavior of individual gates at the IDDT waveform. The second part focuses on identifying a test set that maximizes the defect coverage for path delay fault. The proposed approach utilizes Monte-Carlo simulation efficiently and uses a machine-learning algorithm to select a small test set with high detect coverage.
75

SINGLE TROJAN INJECTION MODEL GENERATION AND DETECTION

Bhamidipati, Harini January 2009 (has links)
No description available.
76

MENESTHEUS VERSUS THE SONS OF THESEAUS: CHANGES IN ATHENIAN TROJAN WAR ICONOGRAPHY FROM THE SIXTH TO FIFTH CENTURIES B.C

KOLB, CHRISTINA L. 05 October 2007 (has links)
No description available.
77

HARDWARE TROJAN ATTACKS: THREAT ANALYSIS AND LOW-COST COUNTERMEASURES THROUGH GOLDEN-FREE DETECTION AND SECURE DESIGN

Wang, Xinmu 21 February 2014 (has links)
No description available.
78

Into the Gates of Troy : A Comparative Study of Antivirus Solutions for the Detection of Trojan Horse Malware.

Hinne, Tom January 2024 (has links)
In the continuously evolving field of malware investigation, a Trojan horse, which appears as innocent software from the user's perspective, represents a significant threat and challenge for antivirus solutions because of their deceptive nature and the various malicious functionalities they provide. This study will compare the effectiveness of three free antiviruses for Linux systems (DrWeb, ClamAV, ESET NOD32) against a dataset of 1919 Trojan malware samples. The evaluation will assess their detection capabilities, resource usage, and the core functionalities they offer. The results revealed a trade-off between these three aspects: DrWeb achieved the highest detection rate (93.43%) but consumed the most resources and provided the most comprehensive functionalities. While ClamAV balanced detection and resource usage with less functionality, ESET NOD32 prioritised low resource usage but showcased a lower detection rate than the other engines (80.93%). Interestingly, the results showed that the category of Trojan horse malware and the file format analysed can affect the detection capabilities of the evaluated antiviruses. This suggests that there is no “silver bullet” for Linux systems against Trojans, and further research in this area is needed to assess the detection capabilities of antivirus engines thoroughly and propose advanced detection methods for robust protection against Trojans on Linux systems.
79

Attacks and Vulnerabilities of Hardware Accelerators for Machine Learning: Degrading Accuracy Over Time by Hardware Trojans

Niklasson, Marcus, Uddberg, Simon January 2024 (has links)
The increasing application of Neural Networks (NNs) in various fields has heightened the demand for specialized hardware to enhance performance and efficiency. Field-Programmable Gate Arrays (FPGAs) have emerged as a popular choice for implementing NN accelerators due to their flexibility, high performance, and ability to be customized for specific NN architectures. However, the trend of outsourcing Integrated Circuit (IC) design to third parties has introduced new security vulnerabilities, particularly in the form of Hardware Trojans (HTs). These malicious alterations can severely compromise the integrity and functionality of NN accelerators. Building upon this, this study investigates a novel type of HT that degrades the accuracy of Convolutional Neural Network (CNN) accelerators over time. Two variants of the attack are presented: Gradually Degrading Accuracy Trojan (GDAT) and Suddenly Degrading Accuracy Trojan (SDAT), implemented in various components of the CNN accelerator. The approach presented leverages a sensitivity analysis to identify the most impactful targets for the trojan and evaluates the attack’s effectiveness based on stealthiness, hardware overhead, and impact on accuracy.  The overhead of the attacks was found to be competitive when compared to other trojans, and has the potential to undermine trust and cause economic damages if deployed. Out of the components targeted, the memory component for the feature maps was identified as the most vulnerable to this attack, closely followed by the bias memory component. The feature map trojans resulted in a significant accuracy degradation of 78.16% with a 0.15% and 0.29% increase in Look-Up-Table (LUT) utilization for the SDAT and GDAT variants, respectively. In comparison, the bias trojans caused an accuracy degradation of 63.33% with a LUT utilization increase of 0.20% and 0.33% for the respective trojans. The power consumption overhead was consistent at 0.16% for both the attacks and trojan versions.
80

L'intertextualité comme procédé dramaturgique dans Hécube et Les Troyennes d'Euripide / Intertextuality used as a dramaturgical device in Euripides' Hecuba and Troades

Wach, Aurélie 28 November 2012 (has links)
Cette étude porte sur les utilisations de l'intertextualité comme procédé dramaturgique dans Hécube et Les Troyennes d'Euripide. Les intertextes considérés sont les épopées homériques et l'Agamemnon d'Eschyle. Après une présentation des problèmes posés par le recours à la notion d' "intertextualité" dans le domaine de la littérature grecque antique, et plus particulièrement du théâtre grec antique, chaque pièce fait l'objet d'une étude approfondie. Les chapitres I à IV portent sur les stasima des deux pièces et posent la question du fonctionnement de l'intertextualité dans la parole lyrique du choeur. Les stasima sont envisagés dans une perspective unificatrice qui vise à mettre en lumière leur rôle de fil directeur dans les deux tragédies. Les chapitres suivants portent sur des passages étendus des deux pièces. L'utilisation de l'intertextualité dans la représentation du sacrifice de Polyxène fait l'objet du chapitre V tandis que le chapitre VI porte sur la double allusion intertextuelle (à l'Odyssée et à l'Agamemnon) mise en place par Euripide pour représenter le vengeance d'Hécube (Hécube). Les chapitres VII et VIII s'intéressent aux Troyennes : d'abord à la scène de Cassandre, comparée à la scène de l'Agamemnon d'Eschyle dont elle constitue une sorte de réécriture ; puis à la scène d'Hélène, où Euripide construit les tensions de son agôn à partir d'un passage précis du chant III de l'Iliade - qu'il rend volontairement encore plus problématique qu'il ne l'est chez Homère à travers les discours de ses deux personnages. La conclusion présente les résultats de cette enquête quant au fonctionnement et quant à diverses fonctions possibles de l'intertextualité dans la tragédie grecque. / This study investigates the question of how intertextuality is used as a dramaturgical device in Euripides' Hecuba and Troades. The intertexts considered here are the Homeric epics and Aeschylus' Agamemnon. After a presentation of the poblems raised by the use of the notion of "intertextuality" in the field of ancient Greek literature, and more specifically Greek theatre, the two dramas are each studied in depth. Chapters I to IV are concerned with the stasima of these plays and raise the question of the specific manner in which intertextuality is inscribed in the lyrical language of the chorus. The stasima are considered from a global perspective in order to highlight their function as a guiding thread running through each drama. The following chapters deal with extended portions of Hecuba and Troades. The use of intertextuality in the representation of the sacrifice of Polyxena is studied in chapter V, whereas chapter VI deals with the double intertextual allusion (both to the Odyssey and to the Agamemnon) engaged in by Euripides in his representation of Hecuba's revenge (in Hecuba). Chapters VII and VIII are about the Troades, focusing firstly on the Cassandra scene, which is compared with the Cassandra scene in Aeschylus' Agamemnon, reworked here by Euripides. Secondly there is the scene involving Helen, where Euripides builds up the tensions of the agôn by basing it on a precise passage of Iliad III - which, in the light of the positions taken by the two characters, he purposely renders even more problematic than it is in Homer. The conclusion presents the results of this inquiry into the functioning and possible purposes of intertextuality in Greek tragedy

Page generated in 0.0351 seconds