![]() |
Volumn , Issue , 2009, Pages 688-693
|
Hardware trojan horse detection using gate-level characterization
|
Author keywords
Gate level characterization; Hardware trojan horses; Linear programming; Manufacturing variability
|
Indexed keywords
APPLICATION PROGRAMS;
COMPUTER AIDED DESIGN;
HARDWARE SECURITY;
LINEAR PROGRAMMING;
MANUFACTURE;
CONSTRAINT MANIPULATION;
DEEP SUB-MICRON TECHNOLOGY;
GATE-LEVEL CHARACTERIZATIONS;
HARDWARE SPECIFICATIONS;
HARDWARE TROJAN HORSE DETECTION;
MANUFACTURING VARIABILITY;
NON-DESTRUCTIVE MEASUREMENT;
RESEARCH AND DEVELOPMENT;
MALWARE;
|
EID: 70350733802
PISSN: 0738100X
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1629911.1630091 Document Type: Conference Paper |
Times cited : (212)
|
References (16)
|