Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically.
Matthew HicksMurph FinnicumSamuel T. KingMilo M. K. MartinJonathan M. SmithPublished in: IEEE Symposium on Security and Privacy (2010)
Keyphrases
- low cost
- hardware and software
- real time
- third party
- detecting malicious
- image processing
- automatically generated
- genetic algorithm
- massively parallel
- power consumption
- user defined
- privacy preserving
- embedded systems
- control system
- computing systems
- information systems
- malicious activities
- learning algorithm
- detect malicious
- temporal video segmentation