Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure
- 2 November 2020
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Hardware and Systems Security
- Vol. 4 (4), 343-360
- https://doi.org/10.1007/s41635-020-00107-9
Abstract
No abstract availableKeywords
This publication has 32 references indexed in Scilit:
- ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet SwitchLecture Notes in Computer Science, 2019
- The P4->NetFPGA Workflow for Line-Rate Packet ProcessingPublished by Association for Computing Machinery (ACM) ,2019
- Advancing the State-of-the-Art in Hardware Trojans DetectionIEEE Transactions on Dependable and Secure Computing, 2017
- Hardware TrojansACM Transactions on Design Automation of Electronic Systems, 2016
- NetFPGAACM SIGCOMM Computer Communication Review, 2015
- VeriTrustPublished by Association for Computing Machinery (ACM) ,2013
- A Survey of Ethernet LAN SecurityIEEE Communications Surveys & Tutorials, 2013
- A Survey on the Application of FPGAs for Network Infrastructure SecurityIEEE Communications Surveys & Tutorials, 2010
- Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware AutomaticallyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Hardware Trojan: Threats and emerging solutionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009