Login / Signup
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically.
Matthew Hicks
Murph Finnicum
Samuel T. King
Milo M. K. Martin
Jonathan M. Smith
Published in:
login Usenix Mag. (2010)
Keyphrases
</>
hardware and software
low cost
automatic detection
real time
third party
automatically generated
general purpose
cloud computing
neural network
computer systems
hardware implementation
vlsi implementation
detect malicious