메뉴 건너뛰기




Volumn 9781441980809, Issue , 2012, Pages 325-338

Trojan taxonomy

Author keywords

[No Author keywords available]

Indexed keywords

MALWARE;

EID: 84949175794     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4419-8080-9_14     Document Type: Chapter
Times cited : (27)

References (12)
  • 3
    • 85193192927 scopus 로고    scopus 로고
    • DARPA. http://www.darpa.mil/mto/solicitations/baa07-24/index.html
    • DARPA1
  • 4
    • 77958115258 scopus 로고    scopus 로고
    • Trustworthy hardware: Identifying and classifying hardware trojans
    • Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: identifying and classifying hardware trojans. Computer 43(10):39-46
    • (2010) Computer , vol.43 , Issue.10 , pp. 39-46
    • Karri, R.1    Rajendran, J.2    Rosenfeld, K.3    Tehranipoor, M.4
  • 11
    • 85193165119 scopus 로고    scopus 로고
    • Trojan attacks for compromising cryptographic security in FPGA encryption systems
    • Stefan D, Mitchell C, Almenar C Trojan attacks for compromising cryptographic security in FPGA encryption systems. Embedded Systems Challenge. http://isis.poly.edu/~vikram/cooper.pdf
    • Embedded Systems Challenge
    • Stefan, D.1    Mitchell, C.2    Almenar, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.