Affiliation:
1. Hardware SecurityFraunhofer AISECGarchingGermany
Publisher
Institution of Engineering and Technology (IET)
Subject
Electrical and Electronic Engineering,Hardware and Architecture,Software
Reference48 articles.
1. Appelbaum J. Horchert J. Stöcker: ‘Shopping for spy gear: catalog advertises NSA toolbox’.Der Spiegel 2013
2. Ball J. Schneier B.: ‘Explaining the latest NSA revelations Q&A with internet privacy experts’.The Guardian 2013
3. Gellman B. Nakashima E.: ‘U.S. spy agencies mounted 231 offensive cyber‐operations in 2011’ documents show 2013
4. Shiyanovskii Y. Wolff F.G. Rajendran A. Papachristou C.A. Weyer D.J. Clay W.: ‘Process reliability based Trojans through NBTI and HCI effects’ 2010 NASA/ESA Conference on Adaptive Hardware and System (AHS) June 15–182010 Anaheim CA (USA) (IEEE 2010) pp.215–222
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans;2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST);2024-05-06
2. Utilizing layout effects for analog logic locking;Journal of Cryptographic Engineering;2024-04-06
3. Trojan Assets and Attack Vectors in Processors;2024 25th International Symposium on Quality Electronic Design (ISQED);2024-04-03
4. A Golden-Free Formal Method for Trojan Detection in Non-Interfering Accelerators;2024 Design, Automation & Test in Europe Conference & Exhibition (DATE);2024-03-25
5. Sequentially Triggering “Time-Bomb” Trojan into Hardware Wired Microsequencer;International Journal of Electrical Engineering and Computer Science;2024-03-19