Leveraging Unspecified Functionality in Obfuscated Hardware for Trojan and Fault Attacks.
Wei HuYixin MaXinmu WangXingxin WangPublished in: AsianHOST (2019)
Keyphrases
- malicious code
- fault injection
- fault diagnosis
- low cost
- real time
- reverse engineering
- hardware and software
- countermeasures
- fault detection
- image processing
- denial of service attacks
- security threats
- fault model
- terrorist attacks
- control system
- computing systems
- watermarking algorithm
- java card
- multiple faults
- security risks
- spam filters
- error detection
- computer security
- security mechanisms
- watermarking scheme
- data acquisition
- computer systems
- signal processing
- web applications
- neural network