Detecting and Thwarting Hardware Trojan Attacks in Cyber-Physical Systems. Venugopalan, V., Patterson, C., & Shila, D. In 2016 IEEE Conference on Communications and Network Security (CNS): International Workshop on Cyber-Physical Systems Security (CPS-Sec), pages 421-425, October, 2016. doi bibtex @inproceedings{Venugopalan2016Detecting-,
author = {Venugopalan, Vivek and Patterson, Cameron and Shila, Devu},
booktitle = {2016 IEEE Conference on Communications and Network Security (CNS): International Workshop on Cyber-Physical Systems Security (CPS-Sec)},
date-added = {2020-01-20 18:26:09 -0500},
date-modified = {2020-01-20 18:26:09 -0500},
doi = {10.1109/CNS.2016.7860530},
keywords = {Field programmable gate arrays;Hardware;IP networks;Measurement;Security;Trojan horses;Design;Reliability;Security;Trust;Verification},
month = oct,
pages = {421-425},
title = {{Detecting and Thwarting Hardware Trojan Attacks in Cyber-Physical Systems}},
year = {2016},
Bdsk-File-1 = {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},
Bdsk-Url-1 = {http://dx.doi.org/10.1109/CNS.2016.7860530}}
Downloads: 0
{"_id":"4Lx7nSv7eZP3Ye5Ld","bibbaseid":"venugopalan-patterson-shila-detectingandthwartinghardwaretrojanattacksincyberphysicalsystems-2016","author_short":["Venugopalan, V.","Patterson, C.","Shila, D."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Venugopalan"],"firstnames":["Vivek"],"suffixes":[]},{"propositions":[],"lastnames":["Patterson"],"firstnames":["Cameron"],"suffixes":[]},{"propositions":[],"lastnames":["Shila"],"firstnames":["Devu"],"suffixes":[]}],"booktitle":"2016 IEEE Conference on Communications and Network Security (CNS): International Workshop on Cyber-Physical Systems Security (CPS-Sec)","date-added":"2020-01-20 18:26:09 -0500","date-modified":"2020-01-20 18:26:09 -0500","doi":"10.1109/CNS.2016.7860530","keywords":"Field programmable gate arrays;Hardware;IP networks;Measurement;Security;Trojan horses;Design;Reliability;Security;Trust;Verification","month":"October","pages":"421-425","title":"Detecting and Thwarting Hardware Trojan Attacks in Cyber-Physical Systems","year":"2016","bdsk-file-1":"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","bdsk-url-1":"http://dx.doi.org/10.1109/CNS.2016.7860530","bibtex":"@inproceedings{Venugopalan2016Detecting-,\n\tauthor = {Venugopalan, Vivek and Patterson, Cameron and Shila, Devu},\n\tbooktitle = {2016 IEEE Conference on Communications and Network Security (CNS): International Workshop on Cyber-Physical Systems Security (CPS-Sec)},\n\tdate-added = {2020-01-20 18:26:09 -0500},\n\tdate-modified = {2020-01-20 18:26:09 -0500},\n\tdoi = {10.1109/CNS.2016.7860530},\n\tkeywords = {Field programmable gate arrays;Hardware;IP networks;Measurement;Security;Trojan horses;Design;Reliability;Security;Trust;Verification},\n\tmonth = oct,\n\tpages = {421-425},\n\ttitle = {{Detecting and Thwarting Hardware Trojan Attacks in Cyber-Physical Systems}},\n\tyear = {2016},\n\tBdsk-File-1 = {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},\n\tBdsk-Url-1 = {http://dx.doi.org/10.1109/CNS.2016.7860530}}\n\n","author_short":["Venugopalan, V.","Patterson, C.","Shila, D."],"bibbaseid":"venugopalan-patterson-shila-detectingandthwartinghardwaretrojanattacksincyberphysicalsystems-2016","role":"author","urls":{},"keyword":["Field programmable gate arrays;Hardware;IP networks;Measurement;Security;Trojan horses;Design;Reliability;Security;Trust;Verification"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/f/R3LGkkqj3uPfqr3NM/vivekv-isi-edu.bib","dataSources":["i5A8jKqyW67R7nn75","oodiEqv3HQNeZtGeC"],"keywords":["field programmable gate arrays;hardware;ip networks;measurement;security;trojan horses;design;reliability;security;trust;verification"],"search_terms":["detecting","thwarting","hardware","trojan","attacks","cyber","physical","systems","venugopalan","patterson","shila"],"title":"Detecting and Thwarting Hardware Trojan Attacks in Cyber-Physical Systems","year":2016}