Login / Signup

An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans.

Kyle J. TemkinDouglas H. Summerville
Published in: CISRC (2016)
Keyphrases