Stealthy Dopant-Level Hardware Trojans. Becker, G. T., Regazzoni, F., Paar, C., & Burleson, W. P. In Bertoni, G. & Coron, J., editors, Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings, volume 8086, of Lecture Notes in Computer Science, pages 197–214, 2013. Springer. Paper doi bibtex @inproceedings{DBLP:conf/ches/BeckerRPB13,
author = {Georg T. Becker and
Francesco Regazzoni and
Christof Paar and
Wayne P. Burleson},
editor = {Guido Bertoni and
Jean{-}S{\'{e}}bastien Coron},
title = {Stealthy Dopant-Level Hardware Trojans},
booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8086},
pages = {197--214},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-40349-1\_12},
doi = {10.1007/978-3-642-40349-1\_12},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ches/BeckerRPB13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"2ikR9DDw7qjQxWLYB","bibbaseid":"becker-regazzoni-paar-burleson-stealthydopantlevelhardwaretrojans-2013","authorIDs":[],"author_short":["Becker, G. T.","Regazzoni, F.","Paar, C.","Burleson, W. P."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Georg","T."],"propositions":[],"lastnames":["Becker"],"suffixes":[]},{"firstnames":["Francesco"],"propositions":[],"lastnames":["Regazzoni"],"suffixes":[]},{"firstnames":["Christof"],"propositions":[],"lastnames":["Paar"],"suffixes":[]},{"firstnames":["Wayne","P."],"propositions":[],"lastnames":["Burleson"],"suffixes":[]}],"editor":[{"firstnames":["Guido"],"propositions":[],"lastnames":["Bertoni"],"suffixes":[]},{"firstnames":["Jean-Sébastien"],"propositions":[],"lastnames":["Coron"],"suffixes":[]}],"title":"Stealthy Dopant-Level Hardware Trojans","booktitle":"Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings","series":"Lecture Notes in Computer Science","volume":"8086","pages":"197–214","publisher":"Springer","year":"2013","url":"https://doi.org/10.1007/978-3-642-40349-1\\_12","doi":"10.1007/978-3-642-40349-1_12","timestamp":"Tue, 31 Mar 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/ches/BeckerRPB13.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/ches/BeckerRPB13,\n author = {Georg T. Becker and\n Francesco Regazzoni and\n Christof Paar and\n Wayne P. Burleson},\n editor = {Guido Bertoni and\n Jean{-}S{\\'{e}}bastien Coron},\n title = {Stealthy Dopant-Level Hardware Trojans},\n booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International\n Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {8086},\n pages = {197--214},\n publisher = {Springer},\n year = {2013},\n url = {https://doi.org/10.1007/978-3-642-40349-1\\_12},\n doi = {10.1007/978-3-642-40349-1\\_12},\n timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/ches/BeckerRPB13.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Becker, G. T.","Regazzoni, F.","Paar, C.","Burleson, W. P."],"editor_short":["Bertoni, G.","Coron, J."],"key":"DBLP:conf/ches/BeckerRPB13","id":"DBLP:conf/ches/BeckerRPB13","bibbaseid":"becker-regazzoni-paar-burleson-stealthydopantlevelhardwaretrojans-2013","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-642-40349-1\\_12"},"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"inproceedings","biburl":"https://bibbase.org/f/QK7udauu9oYiG86Rs/bib.bib","creationDate":"2019-05-11T17:47:04.369Z","downloads":0,"keywords":[],"search_terms":["stealthy","dopant","level","hardware","trojans","becker","regazzoni","paar","burleson"],"title":"Stealthy Dopant-Level Hardware Trojans","year":2013,"dataSources":["XxiQtwZYfozhQmvGR","H8x2obrhjRLyjakpF","ZuojF5jycEf8Xjgko","8gxn7AaKRh7GxNQNx","9LEB4ahCAz8Pkq58E","ZsvDCPRnhBRRCnWQ5"]}