Software exploitable hardware Trojans in embedded processor.
Xinmu WangTatini Mal-SarkarAswin Raghav KrishnaSeetharam NarasimhanSwarup BhuniaPublished in: DFT (2012)
Keyphrases
- embedded systems
- control software
- embedded processors
- high end
- industry standard
- computer systems
- hardware software
- single chip
- hardware design
- instruction set
- low cost
- computer architecture
- software implementation
- software systems
- software development
- hw sw
- hardware and software
- high speed
- real time
- computing power
- hardware platforms
- micro controller
- multi core processors
- hardware designs
- computer hardware
- user interface
- parallel architectures
- parallel processing
- source code
- smart camera
- commercial off the shelf
- computing systems
- blue gene
- control unit
- dedicated hardware
- hardware implementation
- personal computer
- ibm zenterprise
- ibm power processor