Log in to save to my catalogue

Comments on "Defeating HaTCh: Building Malicious IP Cores"

Comments on "Defeating HaTCh: Building Malicious IP Cores"

https://devfeature-collection.sl.nsw.gov.au/record/TN_cdi_proquest_journals_2072030337

Comments on "Defeating HaTCh: Building Malicious IP Cores"

About this item

Full title

Comments on "Defeating HaTCh: Building Malicious IP Cores"

Publisher

Ithaca: Cornell University Library, arXiv.org

Journal title

arXiv.org, 2018-10

Language

English

Formats

Publication information

Publisher

Ithaca: Cornell University Library, arXiv.org

More information

Scope and Contents

Contents

Recently, Haider et al. introduced the first rigorous hardware Trojan detection algorithm called HaTCh. The foundation of HaTCh is a formal framework of hardware Trojan design, which formally characterizes all the hardware Trojans based on its properties. However, Bhardwaj et al. recently published one paper "Defeating HaTCh: Building Malicious IP...

Alternative Titles

Full title

Comments on "Defeating HaTCh: Building Malicious IP Cores"

Authors, Artists and Contributors

Identifiers

Primary Identifiers

Record Identifier

TN_cdi_proquest_journals_2072030337

Permalink

https://devfeature-collection.sl.nsw.gov.au/record/TN_cdi_proquest_journals_2072030337

Other Identifiers

E-ISSN

2331-8422

How to access this item