Defeating hardware Trojan in microprocessor cores through software obfuscation.
Andrea MarcelliErnesto SánchezGiovanni SquilleroMuhammad Usman JamalAfnan ImtiazSimone MachettiFilippo ManganiPaolo MontiDavide PolaAlessandro SalvatoMichele SimiliPublished in: LATS (2018)
Keyphrases
- input output
- ibm zenterprise
- processor core
- computer systems
- memory subsystem
- static analysis
- control flow
- hardware software
- hardware design
- multi core processors
- software development
- embedded systems
- computing platform
- real time
- high end
- computer hardware
- personal computer
- hardware platforms
- software systems
- blue gene
- computing power
- software implementation
- floating point
- computing systems
- hardware and software
- low cost
- reverse engineering
- control software
- virtual instrument
- test cases
- source code
- user interface