Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST.
Elena DubrovaMats NäslundGunnar CarlssonJohn FornehedBen J. M. SmeetsPublished in: J. Signal Process. Syst. (2017)
Keyphrases
- countermeasures
- information security
- low cost
- rural areas
- java card
- hardware and software
- real time
- power analysis
- high resolution
- high frequency
- probability distribution
- cyber attacks
- hardware implementation
- frequency domain
- differential power analysis
- embedded systems
- traffic accidents
- computer systems
- security measures