Partial Reconfiguration for Run-time Memory Faults and Hardware Trojan Attacks Detection.
Ying LiLan ChenJian WangGuanfei GongPublished in: HOST (2022)
Keyphrases
- error detection
- computing power
- low cost
- detection method
- attack detection
- computational power
- object detection
- real time
- internal memory
- detection rate
- memory requirements
- anomaly detection
- hardware and software
- parallel hardware
- compute intensive
- security protocols
- manufacturing systems
- embedded systems
- intrusion detection system
- detection algorithm
- intrusion detection
- computer systems