Login / Signup
Trojan-D2: Post-Layout Design and Detection of Stealthy Hardware Trojans - A RISC-V Case Study.
Sajjad Parvin
Mehran Goli
Frank Sill Torres
Rolf Drechsler
Published in:
ASP-DAC (2023)
Keyphrases
</>
layout design
case study
low cost
hardware architecture
object detection
real time
real world
detection method
false positives
hardware and software
application specific
embedded systems
low power consumption
processing capabilities
integer programming
change detection
detection algorithm
computer systems