Designing and Implementing Malicious Hardware.
Samuel T. KingJoseph TucekAnthony CozzieChris GrierWeihang JiangYuanyuan ZhouPublished in: LEET (2008)
Keyphrases
- low cost
- hardware and software
- real time
- computer systems
- hardware implementation
- image processing
- data acquisition
- computing systems
- vlsi implementation
- standard pc
- malicious attacks
- digital circuits
- hardware architecture
- computing power
- massively parallel
- network security
- embedded systems
- cloud computing
- genetic algorithm