Hardware Trojan

Results: 29



#Item
1Trojan-tolerant Hardware  + Supply Chain Security in Practice Vasilios Mavroudis

Trojan-tolerant Hardware + Supply Chain Security in Practice Vasilios Mavroudis

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
2Private Circuits III: Hardware Trojan-Resilience via Testing Amplification Stefan Dziembowski? , Sebastian Faust?? , and Fran¸cois-Xavier Standaert? ? ? 1  University of Warsaw

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification Stefan Dziembowski? , Sebastian Faust?? , and Fran¸cois-Xavier Standaert? ? ? 1 University of Warsaw

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-10-22 11:32:15
    3SALWARE: Salutary Hardware to design Trusted IC Lilian Bossuet1, David Hely2 1 2

    SALWARE: Salutary Hardware to design Trusted IC Lilian Bossuet1, David Hely2 1 2

    Add to Reading List

    Source URL: www.univ-st-etienne.fr

    Language: English - Date: 2016-04-04 04:42:13
    4Low Power MSIC Signatures for Effective BIST Design Chekka Narasimha Rao M.Tech Student, Audi Sankara Institute of Technology, NH-5 Bypass Road, East Gudur Rural, Andrapradesh

    Low Power MSIC Signatures for Effective BIST Design Chekka Narasimha Rao M.Tech Student, Audi Sankara Institute of Technology, NH-5 Bypass Road, East Gudur Rural, Andrapradesh

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-01-10 06:34:49
    5Intro At-a-Glance Tutorials Exhibits  Plenary & Keynotes  Technical

    Intro At-a-Glance Tutorials Exhibits Plenary & Keynotes Technical

    Add to Reading List

    Source URL: www.itctestweek.org

    Language: English - Date: 2015-09-30 00:55:05
    6Copyright © 2012 American Scientific Publishers All rights reserved Printed in the United States of America Journal of Low Power Electronics

    Copyright © 2012 American Scientific Publishers All rights reserved Printed in the United States of America Journal of Low Power Electronics

    Add to Reading List

    Source URL: euler.ecs.umass.edu

    Language: English - Date: 2012-11-06 11:44:32
    7Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability

    Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability

    Add to Reading List

    Source URL: www.cryptoexperts.com

    Language: English - Date: 2015-11-13 04:48:41
      8www.cost.eu/ict  COST Action no. IC1204 2012⏐2016

      www.cost.eu/ict COST Action no. IC1204 2012⏐2016

      Add to Reading List

      Source URL: w3.cost.eu

      Language: English - Date: 2013-05-30 08:33:11
      9HOST-2010 3rd Annual IEEE International Symposium on Hardware-Oriented Security and Trust June 13-14, 2010 – Anaheim Convention Center, Anaheim, CA  Sunday, June 13th

      HOST-2010 3rd Annual IEEE International Symposium on Hardware-Oriented Security and Trust June 13-14, 2010 – Anaheim Convention Center, Anaheim, CA Sunday, June 13th

      Add to Reading List

      Source URL: www.engr.uconn.edu

      Language: English - Date: 2010-10-16 10:23:01
      10ODETTE: A Non-Scan Design-for-Test Methodology for Trojan Detection in ICs M. Banga and M. Hsiao (Virginia Tech) 11:45 - 1:00: Lunch 1:00 - 2:00: Poster Session Session Chair: Patrick Schaumont

      ODETTE: A Non-Scan Design-for-Test Methodology for Trojan Detection in ICs M. Banga and M. Hsiao (Virginia Tech) 11:45 - 1:00: Lunch 1:00 - 2:00: Poster Session Session Chair: Patrick Schaumont

      Add to Reading List

      Source URL: www.engr.uconn.edu

      Language: English - Date: 2011-05-27 10:02:27