Login / Signup
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC.
Michael Muehlberghuber
Frank K. Gürkaynak
Thomas Korak
Philipp Dunst
Michael Hutter
Published in:
HASP@ISCA (2013)
Keyphrases
</>
hardware implementation
hardware and software
hardware architecture
low cost
real time
computer systems
image processing
automatic detection
data acquisition
multi agent
computing systems
single chip
vlsi implementation
detection method
personal computer
digital images
video analysis
high end