TimingCamouflage+: Netlist Security Enhancement with Unconventional Timing (with Appendix).
Grace Li ZhangBing LiMeng LiBei YuDavid Z. PanMichaela BrunnerGeorg SiglUlf SchlichtmannPublished in: CoRR (2020)
Keyphrases
- information security
- security issues
- security requirements
- image enhancement
- image processing
- security problems
- network security
- intrusion detection
- security policies
- access control
- security mechanisms
- security management
- information assurance
- database design
- risk assessment
- table of contents
- cyber attacks
- functional requirements
- security systems
- information systems
- security measures