An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans. Temkin, K. J. & Summerville, D. H. In Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016, Oak Ridge, TN, USA, April 5-7, 2016, pages 4:1--4:8, 2016.
Paper doi bibtex @inproceedings{DBLP:conf/csiirw/TemkinS16,
author = {Kyle J. Temkin and
Douglas H. Summerville},
title = {An Algorithmic Method for the Implantation of Detection-Resistant
Covert Hardware Trojans},
booktitle = {Proceedings of the 11th Annual Cyber and Information Security Research
Conference, {CISRC} 2016, Oak Ridge, TN, USA, April 5-7, 2016},
pages = {4:1--4:8},
year = {2016},
crossref = {DBLP:conf/csiirw/2016},
url = {http://doi.acm.org/10.1145/2897795.2897811},
doi = {10.1145/2897795.2897811},
timestamp = {Mon, 23 May 2016 01:00:00 +0200},
biburl = {http://dblp.dagstuhl.de/rec/bib/conf/csiirw/TemkinS16},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
Downloads: 0
{"_id":"RBLmKbDGqsoZjDLJM","bibbaseid":"temkin-summerville-analgorithmicmethodfortheimplantationofdetectionresistantcoverthardwaretrojans-2016","downloads":0,"creationDate":"2016-05-03T20:55:13.938Z","title":"An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans","author_short":["Temkin, K. J.","Summerville, D. H."],"year":2016,"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/s/Summerville:Douglas_H=","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Kyle","J."],"propositions":[],"lastnames":["Temkin"],"suffixes":[]},{"firstnames":["Douglas","H."],"propositions":[],"lastnames":["Summerville"],"suffixes":[]}],"title":"An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans","booktitle":"Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016, Oak Ridge, TN, USA, April 5-7, 2016","pages":"4:1--4:8","year":"2016","crossref":"DBLP:conf/csiirw/2016","url":"http://doi.acm.org/10.1145/2897795.2897811","doi":"10.1145/2897795.2897811","timestamp":"Mon, 23 May 2016 01:00:00 +0200","biburl":"http://dblp.dagstuhl.de/rec/bib/conf/csiirw/TemkinS16","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@inproceedings{DBLP:conf/csiirw/TemkinS16,\n author = {Kyle J. Temkin and\n Douglas H. Summerville},\n title = {An Algorithmic Method for the Implantation of Detection-Resistant\n Covert Hardware Trojans},\n booktitle = {Proceedings of the 11th Annual Cyber and Information Security Research\n Conference, {CISRC} 2016, Oak Ridge, TN, USA, April 5-7, 2016},\n pages = {4:1--4:8},\n year = {2016},\n crossref = {DBLP:conf/csiirw/2016},\n url = {http://doi.acm.org/10.1145/2897795.2897811},\n doi = {10.1145/2897795.2897811},\n timestamp = {Mon, 23 May 2016 01:00:00 +0200},\n biburl = {http://dblp.dagstuhl.de/rec/bib/conf/csiirw/TemkinS16},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","author_short":["Temkin, K. J.","Summerville, D. H."],"key":"DBLP:conf/csiirw/TemkinS16","id":"DBLP:conf/csiirw/TemkinS16","bibbaseid":"temkin-summerville-analgorithmicmethodfortheimplantationofdetectionresistantcoverthardwaretrojans-2016","role":"author","urls":{"Paper":"http://doi.acm.org/10.1145/2897795.2897811"},"downloads":0},"search_terms":["algorithmic","method","implantation","detection","resistant","covert","hardware","trojans","temkin","summerville"],"keywords":[],"authorIDs":[],"dataSources":["99Win8fM4MybL7CRT"]}