On the Difficulty of Inserting Trojans in Reversible Computing Architectures - 2018


Fabrication-less style houses outsource their designs to third-party foundries to lower fabrication value. But, this creates opportunities for a rogue in the semiconductor foundry to introduce hardware Trojans, that stay inactive as a rule and cause unintended consequences to the system when triggered. Hardware Trojans in traditional CMOSbased circuits are studied, and Design-for-Trust (DFT) techniques have been proposed to detect them.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Network convergence: theory, architectures, and applicationsABSTRACT:With ever increasing demand for highly correlated video services in wireless networks, network info sources typically carry vast redundancy in
PROJECT TITLE :Multicategory Crowdsourcing Accounting for Variable Task Difficulty, Worker Skill, and Worker IntentionABSTRACT:Crowdsourcing allows instant recruitment of workers on the web to annotate image, webpage, or document
PROJECT TITLE : On the Delay Advantage of Coding in Packet Erasure Networks - 2014 ABSTRACT: We consider the delay of network coding compared to routing with retransmissions in packet erasure networks with probabilistic erasures.
PROJECT TITLE : Multi-Core Embedded Wireless Sensor Networks Architecture and Applications - 2014 ABSTRACT: Technological advancements in the silicon industry, as predicted by Moore's law, have enabled integration of billions
ABSTRACT:Vehicular networking has significant potential to enable diverse applications associated with traffic safety, traffic efficiency and infotainment. In this survey and tutorial paper we introduce the basic characteristics

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry