Hardware Trojan

Results: 29



#Item
11Computer security / Fault injection / Booz Allen Hamilton / Side channel attack / Cyberwarfare / Espionage / Security / Trojan horses / Hardware Trojan

Microsoft Word - HOST2015_Program_v10.docx

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2015-05-05 13:55:29
12Computer network security / Cyberwarfare / Social engineering / Spyware / Physical Unclonable Function / Computer security / Field-programmable gate array / Security / Trojan horses / Hardware Trojan

HOST2nd IEEE International Workshop on Hardware-Oriented Security and Trust July 27, 2009, Moscone Center, Room 304, San Francisco, CA

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2009-10-29 22:42:52
13Computer network security / Computer security / DAFCA / Public safety / Trojan horses / Hardware Trojan / Security

HOSTIEEE International Workshop on Hardware-Oriented Security and Trust June 9, 2008, Anaheim Convention Center, Room 204A, Anaheim, CA

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2009-10-29 22:35:29
14Field-programmable gate array / Electronic engineering / Hardware Trojan / Physical Unclonable Function / Microsemi

Microsoft Word - HOST2013-Program-Farinaz-v4.docx

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2013-06-02 08:49:38
15PUF / Physical Unclonable Function / Randomness / Hardware Trojan

Microsoft Word - HOST14FinalProgram.doc

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2014-08-20 05:16:08
16Fabless semiconductor companies / Reconfigurable computing / Field-programmable gate array / Xilinx / Semiconductor intellectual property core / Embedded system / Altera / Application-specific integrated circuit / Hardware Trojan / Electronic engineering / Electronics / Digital electronics

Enhancing Trust in Reconfigurable Based Hardware Systems with Tags and Monitors Devu Manikantan Shila, Vivek Venugopalan Cameron D Patterson

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-07 22:23:51
17Computer network security / Hacking / Hardware Trojan / Vulnerability / Ring / Computer security / Cyberwarfare / Security

HOSTIEEE International Symposium on

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2014-08-20 05:13:58
18Computer network security / Crime prevention / Electronic commerce / National security / Secure communication / Vulnerability / Side channel attack / Password / Hardware Trojan / Cyberwarfare / Security / Computer security

University Research in Hardware Security Ruby B. Lee Princeton University HotChips Hardware Security Tutorial August 10, 2014

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:02
19Digital electronics / Electronic design / Electronic design automation / Field-programmable gate array / Circuit / Negated AND gate / OR gate / Hardware Trojan / Electronic engineering / Logic gates / Design

Defeating UCI: Building Stealthy and Malicious Hardware Cynthia Sturton University of California, Berkeley Matthew Hicks

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
20Dopant / Trojan horses / Hardware Trojan / Trojan

Stealthy Dopant-Level Hardware Trojans Georg T. Becker1, Francesco Regazzoni2, Christof Paar1,3, and Wayne P. Burleson1 1University

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2013-09-30 16:28:19
UPDATE