Leaking Wireless ICs via Hardware Trojan-Infected Synchronization.
Alán Rodrigo Díaz RizoHassan AboushadyHaralampos-G. StratigopoulosPublished in: IEEE Trans. Dependable Secur. Comput. (2023)
Keyphrases
- low cost
- wireless networks
- hardware and software
- wireless communication
- real time
- image processing
- vlsi implementation
- communication technologies
- computer viruses
- mobile devices
- wifi
- computing power
- computer systems
- embedded systems
- hardware implementation
- sensitive information
- access network
- mobile ad hoc networks
- chaotic systems
- parallel hardware
- mobile communication
- wireless channels
- cellular networks
- massively parallel
- mobile networks
- computational power
- privacy preserving
- multimedia