Login / Signup

Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC.

Michael MuehlberghuberFrank K. GürkaynakThomas KorakPhilipp DunstMichael Hutter
Published in: HASP@ISCA (2013)
Keyphrases