Sign in

On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator.

Andrea MarcelliErnesto SánchezLuca SasselliGiovanni Squillero
Published in: IVSW (2018)
Keyphrases
  • embedded processors
  • hardware and software
  • real time
  • low cost
  • single chip
  • computer systems
  • parallel implementation
  • image processing