Hardware Trojan

Results: 29



#Item
11Microsoft Word - HOST2015_Program_v10.docx

Microsoft Word - HOST2015_Program_v10.docx

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2015-05-05 13:55:29
12HOST2nd IEEE International Workshop on Hardware-Oriented Security and Trust July 27, 2009, Moscone Center, Room 304, San Francisco, CA

HOST2nd IEEE International Workshop on Hardware-Oriented Security and Trust July 27, 2009, Moscone Center, Room 304, San Francisco, CA

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2009-10-29 22:42:52
13HOSTIEEE International Workshop on Hardware-Oriented Security and Trust June 9, 2008, Anaheim Convention Center, Room 204A, Anaheim, CA

HOSTIEEE International Workshop on Hardware-Oriented Security and Trust June 9, 2008, Anaheim Convention Center, Room 204A, Anaheim, CA

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2009-10-29 22:35:29
14Microsoft Word - HOST2013-Program-Farinaz-v4.docx

Microsoft Word - HOST2013-Program-Farinaz-v4.docx

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2013-06-02 08:49:38
15Microsoft Word - HOST14FinalProgram.doc

Microsoft Word - HOST14FinalProgram.doc

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2014-08-20 05:16:08
16Enhancing Trust in Reconfigurable Based Hardware Systems with Tags and Monitors Devu Manikantan Shila, Vivek Venugopalan Cameron D Patterson

Enhancing Trust in Reconfigurable Based Hardware Systems with Tags and Monitors Devu Manikantan Shila, Vivek Venugopalan Cameron D Patterson

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-07 22:23:51
17HOSTIEEE International Symposium on

HOSTIEEE International Symposium on

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2014-08-20 05:13:58
18University Research in Hardware Security Ruby B. Lee Princeton University HotChips Hardware Security Tutorial August 10, 2014

University Research in Hardware Security Ruby B. Lee Princeton University HotChips Hardware Security Tutorial August 10, 2014

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:02
19Defeating UCI: Building Stealthy and Malicious Hardware Cynthia Sturton University of California, Berkeley  Matthew Hicks

Defeating UCI: Building Stealthy and Malicious Hardware Cynthia Sturton University of California, Berkeley Matthew Hicks

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
20Stealthy Dopant-Level Hardware Trojans Georg T. Becker1, Francesco Regazzoni2, Christof Paar1,3, and Wayne P. Burleson1 1University

Stealthy Dopant-Level Hardware Trojans Georg T. Becker1, Francesco Regazzoni2, Christof Paar1,3, and Wayne P. Burleson1 1University

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2013-09-30 16:28:19