Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/2360
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sudeendra Kumar, K | - |
dc.contributor.author | Mahapatra, K K | - |
dc.date.accessioned | 2015-09-14T13:28:49Z | - |
dc.date.available | 2015-09-14T13:28:49Z | - |
dc.date.issued | 2015-08 | - |
dc.identifier.citation | International Conference on Emerging Trends in Engineering and Technology, 2015, Mangalore, 23rd Aug, 2015 | en_US |
dc.identifier.uri | http://hdl.handle.net/2080/2360 | - |
dc.description | Copyright belong to proceeding publisher | en_US |
dc.description.abstract | Time to market demand has forced integrated circuit design, manufacturing and testing to be done at different places across globe. This approach has led to numerous security concerns like overbuilding of chips from foundries, IP protection, counterfeiting and hardware Trojans. In this work, we focus on hardware Trojans in chips. In the process of finding the answer to above mentioned security issues, we present literature survey, interim results and a holistic view on possible future work. We also present the case study of hardware Trojans. | en_US |
dc.language.iso | en | en_US |
dc.subject | Hardware Trojans (HTs) | en_US |
dc.subject | AES | en_US |
dc.subject | Benchmark | en_US |
dc.title | Hardware Trojans: A State of the Art | en_US |
dc.type | Article | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
HardwareTrojans-AstateofArt_CP_Sudeendra.pdf | 491.09 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.