The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs.
David KnichelThorben MoosAmir MoradiPublished in: ETS (2020)
Keyphrases
- third party
- reverse logistics
- risk management
- data providers
- outsourced databases
- smart card
- personal information
- sensitive information
- win win
- information technology
- security protocols
- decision making
- mashup
- business process
- private information
- hash functions
- network design
- ip address
- business processes
- operating system