Author:
Palumbo Alessandro,Cassano Luca,Reviriego Pedro,Bianchi Giuseppe,Ottavi Marco
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Built-in Software Obfuscation for Protecting Microprocessors against Hardware Trojan Horses;2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT);2023-10-03
2. Improving the Detection of Hardware Trojan Horses in Microprocessors via Hamming Codes;2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT);2023-10-03
3. Towards Dependable RISC-V Cores for Edge Computing Devices;2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS);2023-07-03
4. DEV-PIM: Dynamic Execution Validation with Processing-in-Memory;2023 IEEE European Test Symposium (ETS);2023-05-22
5. Preventing Soft Errors and Hardware Trojans in RISC-V Cores;2022 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT);2022-10-19