Built-in Software Obfuscation for Protecting Microprocessors against Hardware Trojan Horses.
Alessandro PalumboMarco OttaviLuca CassanoPublished in: DFT (2023)
Keyphrases
- personal computer
- hardware design
- computer systems
- computing power
- software implementation
- control flow
- embedded systems
- single chip
- computer hardware
- computer architecture
- static analysis
- hardware platforms
- hardware software
- software development
- low cost
- software systems
- real time
- software tools
- hardware implementation
- hardware and software
- source code
- dedicated hardware
- high end
- hardware designs
- virtual instrument
- industry standard
- blue gene
- instruction set
- data flow
- massively parallel
- modeling language
- runtime environment
- software developers
- hardware description language
- operating system
- case study