Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion.
Hassan SalmaniMark M. TehranipoorPublished in: IEEE Trans. Inf. Forensics Secur. (2016)
Keyphrases
- circuit design
- digital circuits
- low cost
- evolvable hardware
- hardware description language
- hardware and software
- real time
- high speed
- data acquisition
- computing power
- data sets
- vlsi implementation
- hardware architecture
- single chip
- massively parallel
- hardware implementation
- embedded systems
- computer systems
- integrated circuit
- image processing
- personal computer
- analog circuits
- random number generator
- gate array
- chip design
- power reduction
- layout design
- control system
- high end
- hardware design
- computing systems