Linked e-resources

Details

Hardware Trojan Detection: Untrusted Third-party IP Cores
Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits
Design for Hardware Trust: Dummy Scan Flip-flop Insertion
Design for Hardware Trust: Layout-aware Scan Cell Reordering
Design for Hardware Trust: Ring Oscillator Network
Design Vulnerability Analysis
Trojan Prevention: Built-In Self-Authentication
Counterfeit ICs: Taxonomies, Assessment, and Challenges
Counterfeit ICs: Detection and Prevention of Recycled ICs Using On-chip Sensors
Counterfeit ICs: Pathy-Delay Fingerprinting.

Browse Subjects

Show more subjects...

Statistics

from
to
Export