Login / Signup
Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry.
Sheng Wei
Kai Li
Farinaz Koushanfar
Miodrag Potkonjak
Published in:
DAC (2012)
Keyphrases
</>
low cost
dynamic programming
hardware and software
optimal solution
real world
real time
computing systems
general purpose
worst case
computer systems
personal computer
optimal control
comparative analysis
optimal strategy
computing power
cyber security
hardware architecture