Login / Signup

Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry.

Sheng WeiKai LiFarinaz KoushanfarMiodrag Potkonjak
Published in: DAC (2012)
Keyphrases