Login / Signup
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions.
Xiaoxiao Wang
Mohammad Tehranipoor
Jim Plusquellic
Published in:
HOST (2008)
Keyphrases
</>
low cost
real time
detecting malicious
security issues
detect malicious
computer systems
information security
security mechanisms
key management