Login / Signup
Defeating UCI: Building Stealthy and Malicious Hardware.
Cynthia Sturton
Matthew Hicks
David A. Wagner
Samuel T. King
Published in:
IEEE Symposium on Security and Privacy (2011)
Keyphrases
</>
real time
low cost
hardware and software
embedded systems
benchmark data sets
computing power
data structure
computing systems
databases
machine learning algorithms
benchmark datasets
data acquisition
high end
digital circuits
software implementation
malicious behavior