Funder
Agencia Estatal de Investigación
Subject
Hardware and Architecture,Software
Reference49 articles.
1. Y. Jin, M. Maniatakos, Y. Makris, Exposing vulnerabilities of untrusted computing platforms, in: Proc. Int. Conf. Comput. Des., 2012, pp. 131–134.
2. Fabrication attacks: Zero-overhead malicious modifications enabling modern microprocessor privilege escalation;Tsoutsos;IEEE Trans. Emerg. Top. Comput.,2014
3. Software exploitable hardware trojans in embedded processor;Wang,2012
4. Hardware backdoors in x86 cpus;Domas,2018
5. Project:rosenbridge,2022
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Improving the Detection of Hardware Trojan Horses in Microprocessors via Hamming Codes;2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT);2023-10-03
2. Built-in Software Obfuscation for Protecting Microprocessors against Hardware Trojan Horses;2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT);2023-10-03
3. A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges;Journal of Systems Architecture;2023-08
4. Towards Dependable RISC-V Cores for Edge Computing Devices;2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS);2023-07-03
5. Automating Hardware Trojan Detection Using Unsupervised Learning: A Case Study of FPGA;2023 24th International Symposium on Quality Electronic Design (ISQED);2023-04-05