Securing 3rd-Party HDL IP: a Feasibility Study Using Evolutionary Methods
The publisher has not yet granted permission to display this abstract.
Keywords: Hardware security / 3rd-party IP / HDL supply chain / Trojan removal / Evolutionary computing
Scifeed alert for new publicationsNever miss any articles matching your research from any publisher
- Get alerts for new papers matching your research
- Find out the new papers from selected authors
- Updated daily for 49'000+ journals and 6000+ publishers
- Define your Scifeed now
Click here to see the statistics on "Journal of Hardware and Systems Security" .