Exploiting the critical infrastructure via nontraditional system inputs
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry
Proceedings of the 49th Annual Design Automation Conference
Energy attacks and defense techniques for wireless systems
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Proceedings of the Conference on Design, Automation and Test in Europe
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
Detection of trojans using a combined ring oscillator network and off-chip transient power analysis
ACM Journal on Emerging Technologies in Computing Systems (JETC)
Hi-index | 4.10 |
Globalization of the semiconductor industry and associated supply chains have made integrated circuits increasingly vulnerable toTrojans. Researchers must expand efforts to verify trust in intellectual property cores and ICs.