E-Books durchsuchen

Logic Locking [2022]

1
Introduction
2
Background
3
Hardware Trojans
4
Working Principle and Attack Scenarios
5
Attacks and Schemes
6
Security Metrics: One Problem, Many Dimensions
7
Software Framework
8
Processor Integrity Protection
9
Security Evaluation with Machine Learning
10
Designing Deceptive Logic Locking
11
Research Directions
12
Conclusion
Feedback