Sciweavers

HOST   2009 International Workshop on Hardware-Oriented Security and Trust
Wall of Fame | Most Viewed HOST-2009 Paper
HOST
2009
IEEE
13 years 11 months ago
Detecting Trojan Circuit Attacks
Abstract—Rapid advances in integrated circuit (IC) development predicted by Moore’s Law lead to increasingly complex, hard to verify IC designs. Design insiders or adversaries ...
Gedare Bloom, Bhagirath Narahari, Rahul Simha
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source164
2Download preprint from source142
3Download preprint from source139
4Download preprint from source121
5Download preprint from source113
6Download preprint from source111
7Download preprint from source107