Security Closure of IC Layouts Against Hardware Trojans.
Fangzhou WangQijing WangBangqi FuShui JiangXiaopeng ZhangLilas AlrahisOzgur SinanogluJohann KnechtelTsung-Yi HoEvangeline F. Y. YoungPublished in: ISPD (2023)
Keyphrases
- random number generator
- low cost
- information security
- real time
- security issues
- hardware and software
- access control
- network security
- integrated circuit
- computer security
- computer systems
- encryption algorithms
- security systems
- intrusion detection
- network access
- computing power
- trusted computing
- statistical databases
- information assurance
- security requirements
- computing systems
- security policies
- personal computer
- embedded systems
- parallel hardware
- windows xp
- biometric systems
- security problems
- hardware architecture
- cyber attacks
- circuit design
- security mechanisms
- massively parallel
- hardware implementation
- signal processing
- image processing
- information systems