z-logo
open-access-imgOpen Access
Perniciousness analysis of IC hardware Trojan based on characteristic function deployment
Author(s) -
Jiaoying Huang,
Daming Yang,
Yongkang Wan
Publication year - 2018
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1074/1/012089
Subject(s) - hardware trojan , trojan , software deployment , payload (computing) , computer science , relation (database) , hardware security module , function (biology) , embedded system , computer hardware , measure (data warehouse) , computer security , operating system , cryptography , data mining , evolutionary biology , network packet , biology

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here