Hardware Trojan attacks in embedded memory.
Tamzidul HoqueXinmu WangAbhishek BasakRobert KaramSwarup BhuniaPublished in: VTS (2018)
Keyphrases
- embedded systems
- computing power
- control software
- watermarking algorithm
- low cost
- internal memory
- countermeasures
- memory management
- computational power
- watermarking technique
- hardware and software
- blind watermarking
- parallel hardware
- memory requirements
- embedded processors
- micro controller
- real time embedded
- real time
- robust watermarking scheme
- hardware implementation
- data corruption
- memory access
- memory hierarchy
- dynamic random access memory
- virtual memory
- field programmable gate array
- jpeg compression
- computing systems
- watermarking scheme
- computer systems
- malicious code
- memory size
- security protocols
- security mechanisms
- memory subsystem
- digital signal processors
- main memory