Login / Signup

Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically.

Matthew HicksMurph FinnicumSamuel T. KingMilo M. K. MartinJonathan M. Smith
Published in: IEEE Symposium on Security and Privacy (2010)
Keyphrases