Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

leakage power

biblio

Visible to the public Hardware malicious circuit identification using self referencing approach

Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
  • post-silicon testing
  • Trojan horses
  • testing
  • Test vector generation
  • Temporal Self Referencing
  • side channel analysis
  • sequential Trojans
  • Sequential trojan
  • self referencing approach
  • security vulnerabilities
  • Robust Trojans
  • Resiliency
  • resilience
  • pubcrawl
  • Power measurement
  • composability
  • Payloads
  • outsourced products
  • Microelectronic Security
  • Metrics
  • malicious inclusions
  • logic testing
  • leakage power
  • invasive software
  • hardware Trojan detection sensitivity
  • hardware malicious circuit identification
  • Hardware
  • delays
  • Cryptography

Terms of Use  |  ©2023. CPS-VO