Funder
Agencia Estatal de Investigación
Subject
Hardware and Architecture,Software
Reference49 articles.
1. Y. Jin, M. Maniatakos, Y. Makris, Exposing vulnerabilities of untrusted computing platforms, in: Proc. Int. Conf. Comput. Des., 2012, pp. 131–134.
2. Fabrication attacks: Zero-overhead malicious modifications enabling modern microprocessor privilege escalation;Tsoutsos;IEEE Trans. Emerg. Top. Comput.,2014
3. Software exploitable hardware trojans in embedded processor;Wang,2012
4. Hardware backdoors in x86 cpus;Domas,2018
5. Project:rosenbridge,2022
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. FazyRV: Closing the Gap between 32-Bit and Bit-Serial RISC-V Cores with a Scalable Implementation;Proceedings of the 21st ACM International Conference on Computing Frontiers;2024-05-07
2. Performance Evaluation of Hardware Trojan in SoC with Custom Overlay;2024 IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI);2024-03-14
3. Post-configuration Activation of Hardware Trojans in FPGAs;Journal of Hardware and Systems Security;2024-03-13
4. Enhancing Trojan Detection using Machine Learning: Comparative Analysis of Classifier Performance on Embedded Hardware;2023 9th International Conference on Signal Processing and Communication (ICSC);2023-12-21
5. Built-in Software Obfuscation for Protecting Microprocessors against Hardware Trojan Horses;2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT);2023-10-03