Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGA. Shila, D. & Venugopalan, V. In IEEE International Conference on Communications (ICC), pages 719-724, June, 2014. bibtex @inproceedings{Shila2014Design-imp2,
author = {Shila, Devu and Venugopalan, Vivek},
booktitle = {IEEE International Conference on Communications (ICC)},
date-added = {2020-01-15 12:02:05 -0500},
date-modified = {2020-01-15 12:02:05 -0500},
keywords = {Encryption;Field programmable gate arrays;Hardware;Power demand;Timing;Trojan horses;Design;Hardware Trojans;Resiliency;Security},
month = jun,
pages = {719-724},
title = {{Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGA}},
year = {2014},
Bdsk-File-1 = {YnBsaXN0MDDSAQIDBFxyZWxhdGl2ZVBhdGhZYWxpYXNEYXRhXxAsLi4vLi4vcmVmZXJlbmNlcy9QREYvU2hpbGEyMDE0RGVzaWduLWltcC5wZGZPEQGCAAAAAAGCAAIAAAxNYWNpbnRvc2ggSEQAAAAAAAAAAAAAAAAAAAAAAAAAQkQAAf////8XU2hpbGEyMDE0RGVzaWduLWltcC5wZGYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/////wAAAAAAAAAAAAAAAAACAAMAAAogY3UAAAAAAAAAAAAAAAAAA1BERgAAAgA9LzpVc2Vyczp2aXZla3Y6RHJvcGJveDpyZWZlcmVuY2VzOlBERjpTaGlsYTIwMTREZXNpZ24taW1wLnBkZgAADgAwABcAUwBoAGkAbABhADIAMAAxADQARABlAHMAaQBnAG4ALQBpAG0AcAAuAHAAZABmAA8AGgAMAE0AYQBjAGkAbgB0AG8AcwBoACAASABEABIAO1VzZXJzL3ZpdmVrdi9Ecm9wYm94L3JlZmVyZW5jZXMvUERGL1NoaWxhMjAxNERlc2lnbi1pbXAucGRmAAATAAEvAAAVAAIADf//AAAACAANABoAJABTAAAAAAAAAgEAAAAAAAAABQAAAAAAAAAAAAAAAAAAAdk=},
Bdsk-Url-1 = {http://dx.doi.org/10.1109/ICC.2014.6883404}}
Downloads: 0
{"_id":"MTSS5zBZZeSiaPfDb","bibbaseid":"shila-venugopalan-designimplementationandsecurityanalysisofhardwaretrojanthreatsinfpga-2014","author_short":["Shila, D.","Venugopalan, V."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Shila"],"firstnames":["Devu"],"suffixes":[]},{"propositions":[],"lastnames":["Venugopalan"],"firstnames":["Vivek"],"suffixes":[]}],"booktitle":"IEEE International Conference on Communications (ICC)","date-added":"2020-01-15 12:02:05 -0500","date-modified":"2020-01-15 12:02:05 -0500","keywords":"Encryption;Field programmable gate arrays;Hardware;Power demand;Timing;Trojan horses;Design;Hardware Trojans;Resiliency;Security","month":"June","pages":"719-724","title":"Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGA","year":"2014","bdsk-file-1":"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","bdsk-url-1":"http://dx.doi.org/10.1109/ICC.2014.6883404","bibtex":"@inproceedings{Shila2014Design-imp2,\n\tauthor = {Shila, Devu and Venugopalan, Vivek},\n\tbooktitle = {IEEE International Conference on Communications (ICC)},\n\tdate-added = {2020-01-15 12:02:05 -0500},\n\tdate-modified = {2020-01-15 12:02:05 -0500},\n\tkeywords = {Encryption;Field programmable gate arrays;Hardware;Power demand;Timing;Trojan horses;Design;Hardware Trojans;Resiliency;Security},\n\tmonth = jun,\n\tpages = {719-724},\n\ttitle = {{Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGA}},\n\tyear = {2014},\n\tBdsk-File-1 = {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},\n\tBdsk-Url-1 = {http://dx.doi.org/10.1109/ICC.2014.6883404}}\n\n","author_short":["Shila, D.","Venugopalan, V."],"bibbaseid":"shila-venugopalan-designimplementationandsecurityanalysisofhardwaretrojanthreatsinfpga-2014","role":"author","urls":{},"keyword":["Encryption;Field programmable gate arrays;Hardware;Power demand;Timing;Trojan horses;Design;Hardware Trojans;Resiliency;Security"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/f/R3LGkkqj3uPfqr3NM/vivekv-isi-edu.bib","dataSources":["i5A8jKqyW67R7nn75","oodiEqv3HQNeZtGeC"],"keywords":["encryption;field programmable gate arrays;hardware;power demand;timing;trojan horses;design;hardware trojans;resiliency;security"],"search_terms":["design","implementation","security","analysis","hardware","trojan","threats","fpga","shila","venugopalan"],"title":"Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGA","year":2014}