메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Designing and implementing malicious hardware

Author keywords

[No Author keywords available]

Indexed keywords

BOTNET; COMPUTER VIRUSES;

EID: 85084095841     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (240)

References (19)
  • 5
    • 2842568131 scopus 로고
    • Internal architecture of alpha 21164 microprocessor
    • 00:79
    • P. Bannon and J. Keller. Internal architecture of alpha 21164 microprocessor. compcon, 00:79, 1995.
    • (1995) Compcon
    • Bannon, P.1    Keller, J.2
  • 7
    • 0042078549 scopus 로고    scopus 로고
    • A survey of rollback-recovery protocols in message-passing systems
    • September
    • E. N. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson. A Survey of Rollback-Recovery Protocols in Message-Passing Systems. ACM Computing Surveys, 34(3), September 2002.
    • (2002) ACM Computing Surveys , vol.34 , Issue.3
    • Elnozahy, E.N.1    Alvisi, L.2    Wang, Y.-M.3    Johnson, D.B.4
  • 10
    • 62349114557 scopus 로고    scopus 로고
    • CIA slipped bugs to soviets
    • February
    • D. E. Hoffman. CIA slipped bugs to Soviets. The Washington Post, February 2004. http://www.msnbc.msn.com/id/4394002.
    • (2004) The Washington Post
    • Hoffman, D.E.1
  • 13
    • 0034334788 scopus 로고    scopus 로고
    • Chip detectives
    • J. Kumagai. Chip detectives. IEEE Spectr., 37(11):43–49, 2000.
    • (2000) IEEE Spectr , vol.37 , Issue.11 , pp. 43-49
    • Kumagai, J.1
  • 17
    • 17644364039 scopus 로고    scopus 로고
    • Design and analysis of dual-rail circuits for security applications
    • D. Sokolov, J. Murphy, A. Bystrov, and A. Yakovlev. Design and analysis of dual-rail circuits for security applications. IEEE Trans. Comput., 54(4):449–460, 2005.
    • (2005) IEEE Trans. Comput. , vol.54 , Issue.4 , pp. 449-460
    • Sokolov, D.1    Murphy, J.2    Bystrov, A.3    Yakovlev, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.