An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans. Temkin, K. J. & Summerville, D. H. In Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016, Oak Ridge, TN, USA, April 5-7, 2016, pages 4:1--4:8, 2016.
An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans [link]Paper  doi  bibtex   
@inproceedings{DBLP:conf/csiirw/TemkinS16,
  author    = {Kyle J. Temkin and
               Douglas H. Summerville},
  title     = {An Algorithmic Method for the Implantation of Detection-Resistant
               Covert Hardware Trojans},
  booktitle = {Proceedings of the 11th Annual Cyber and Information Security Research
               Conference, {CISRC} 2016, Oak Ridge, TN, USA, April 5-7, 2016},
  pages     = {4:1--4:8},
  year      = {2016},
  crossref  = {DBLP:conf/csiirw/2016},
  url       = {http://doi.acm.org/10.1145/2897795.2897811},
  doi       = {10.1145/2897795.2897811},
  timestamp = {Mon, 23 May 2016 01:00:00 +0200},
  biburl    = {http://dblp.dagstuhl.de/rec/bib/conf/csiirw/TemkinS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}

Downloads: 0