Security Closure of IC Layouts Against Hardware Trojans.
Fangzhou WangQijing WangBangqi FuShui JiangXiaopeng ZhangLilas AlrahisOzgur SinanogluJohann KnechtelTsung-Yi HoEvangeline F. Y. YoungPublished in: CoRR (2022)
Keyphrases
- low cost
- random number generator
- information security
- information assurance
- real time
- security systems
- network security
- hardware and software
- security issues
- integrated circuit
- functional requirements
- trusted computing
- hardware implementation
- intrusion detection
- security measures
- security threats
- security requirements
- security level
- protection scheme
- security model
- field programmable gate array
- security policies
- computer systems
- cyber security
- computer security
- key management
- massively parallel
- computing systems
- access control
- image processing