Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/2360
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSudeendra Kumar, K-
dc.contributor.authorMahapatra, K K-
dc.date.accessioned2015-09-14T13:28:49Z-
dc.date.available2015-09-14T13:28:49Z-
dc.date.issued2015-08-
dc.identifier.citationInternational Conference on Emerging Trends in Engineering and Technology, 2015, Mangalore, 23rd Aug, 2015en_US
dc.identifier.urihttp://hdl.handle.net/2080/2360-
dc.descriptionCopyright belong to proceeding publisheren_US
dc.description.abstractTime to market demand has forced integrated circuit design, manufacturing and testing to be done at different places across globe. This approach has led to numerous security concerns like overbuilding of chips from foundries, IP protection, counterfeiting and hardware Trojans. In this work, we focus on hardware Trojans in chips. In the process of finding the answer to above mentioned security issues, we present literature survey, interim results and a holistic view on possible future work. We also present the case study of hardware Trojans.en_US
dc.language.isoenen_US
dc.subjectHardware Trojans (HTs)en_US
dc.subjectAESen_US
dc.subjectBenchmarken_US
dc.titleHardware Trojans: A State of the Arten_US
dc.typeArticleen_US
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
HardwareTrojans-AstateofArt_CP_Sudeendra.pdf491.09 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.