Login / Signup
Hardware trojan attacks in FPGA devices: threat analysis and effective counter measures.
Sanchita Mal-Sarkar
Aswin Raghav Krishna
Anandaroop Ghosh
Swarup Bhunia
Published in:
ACM Great Lakes Symposium on VLSI (2014)
Keyphrases
</>
countermeasures
information security
real time
embedded systems
hardware and software
low cost
high speed
image processing
mobile devices
anomaly detection
data acquisition
embedded devices
hardware software
dedicated hardware