Provably complete hardware Trojan detection using test point insertion.
Sheng WeiKai LiFarinaz KoushanfarMiodrag PotkonjakPublished in: ICCAD (2012)
Keyphrases
- real time
- low cost
- automatic detection
- object detection
- detection method
- detection algorithm
- single point
- false alarms
- search algorithm
- detection accuracy
- test data
- computer systems
- anomaly detection
- event detection
- general purpose
- embedded systems
- worst case
- digital images
- target detection
- massively parallel
- computing power
- object recognition
- detection scheme