SRAM Security and Vulnerability To Hardware Trojan: Design Considerations.
Roghayeh SaeidiMorteza NabaviYvon SavariaPublished in: MWSCAS (2020)
Keyphrases
- design considerations
- random access memory
- low voltage
- security vulnerabilities
- random number generator
- buffer overflow
- information security
- risk assessment
- low cost
- national security
- real time
- security requirements
- security problems
- hardware and software
- security risks
- pedagogical agents
- power consumption
- cyber security
- intrusion detection
- access control
- network security
- computer systems
- penetration testing
- power management
- critical infrastructure
- computing systems
- mobile devices
- security properties
- protection scheme
- security policies