Author:
Ender Maik,Ghandali Samaneh,Moradi Amir,Paar Christof
Publisher
Springer International Publishing
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Post-configuration Activation of Hardware Trojans in FPGAs;Journal of Hardware and Systems Security;2024-03-13
2. Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version);Journal of Cryptographic Engineering;2023-05-29
3. Hardware Trojan and Countermeasures for Internet of Things;2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT);2022-11-20
4. Hardware Moving Target Defenses against Physical Attacks;Proceedings of the 9th ACM Workshop on Moving Target Defense;2022-11-07
5. On the Detection and Circumvention of Bitstream-level Trojans in FPGAs;2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI);2022-07