Login / Signup
A security-aware design scheme for better hardware Trojan detection sensitivity.
Chongxi Bao
Yang Xie
Ankur Srivastava
Published in:
HOST (2015)
Keyphrases
</>
detection scheme
functional requirements
hardware design
control program
hardware implementation
real time
object detection
vlsi implementation
embedded systems
security policies
protection scheme
digital circuits
hardware architecture
false alarms
network security
detection method
design process
case study