Using outliers to detect stealthy hardware trojan triggering?
Papa-Sidy BaSophie DupuisMarie-Lise FlottesGiorgio Di NataleBruno RouzeyrePublished in: IVSW (2016)
Keyphrases
- low cost
- hardware and software
- detection method
- real time
- automatic detection
- outlier detection
- detection algorithm
- image processing
- vlsi implementation
- missing data
- hardware implementation
- computing systems
- data points
- operating system
- cloud computing
- noisy data
- computer systems
- embedded systems
- data processing
- active databases