E-Books durchsuchen
Logic Locking [2022]
- 1
-
Introduction
- 2
-
Background
- 3
-
Hardware Trojans
- 4
-
Working Principle and Attack Scenarios
- 5
-
Attacks and Schemes
- 6
-
Security Metrics: One Problem, Many Dimensions
- 7
-
Software Framework
- 8
-
Processor Integrity Protection
- 9
-
Security Evaluation with Machine Learning
- 10
-
Designing Deceptive Logic Locking
- 11
-
Research Directions
- 12
-
Conclusion