On the Difficulty of Inserting Trojans in Reversible Computing Architectures - 2018


Fabrication-less style houses outsource their designs to third-party foundries to lower fabrication value. But, this creates opportunities for a rogue in the semiconductor foundry to introduce hardware Trojans, that stay inactive as a rule and cause unintended consequences to the system when triggered. Hardware Trojans in traditional CMOSbased circuits are studied, and Design-for-Trust (DFT) techniques have been proposed to detect them.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : On the Delay Advantage of Coding in Packet Erasure Networks - 2014 ABSTRACT: We consider the delay of network coding compared to routing with retransmissions in packet erasure networks with probabilistic erasures.
PROJECT TITLE : Multi-Core Embedded Wireless Sensor Networks Architecture and Applications - 2014 ABSTRACT: Technological advancements in the silicon industry, as predicted by Moore's law, have enabled integration of billions
ABSTRACT:Games are played by a wide variety of audiences. Different individuals will play with different gaming styles and employ different strategic approaches. This often involves interacting with nonplayer characters that are

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry