Hardware Patching Methodology for Neutralizing Timing Hardware Trojans Using Vulnerability Analysis and Time Borrowing Scheme.
Fatemeh KhormiziAhmad ShabaniBijan AlizadehPublished in: IEEE Trans. Circuits Syst. II Express Briefs (2022)
Keyphrases
- real time
- low cost
- vlsi implementation
- hardware and software
- protection scheme
- personal computer
- computing systems
- high speed
- computer systems
- hardware implementation
- parallel hardware
- hardware architecture
- embedded systems
- data sets
- low power
- website
- field programmable gate array
- graphics hardware
- information systems
- information retrieval
- hardware software
- data mining