Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST.
Elena DubrovaMats NäslundGunnar CarlssonJohn FornehedBen J. M. SmeetsPublished in: CoRR (2015)
Keyphrases
- countermeasures
- information security
- real time
- hardware and software
- rural areas
- low cost
- high frequency
- hardware implementation
- high resolution
- power analysis
- embedded systems
- probability distribution
- java card
- cyber attacks
- information warfare
- security measures
- control system
- real world
- traffic accidents
- computer security
- resource constrained