2018
DOI: 10.1016/j.micpro.2017.11.001
|View full text |Cite
|
Sign up to set email alerts
|

TASPDetect: Reviving Trust in 3PIP By Detecting TASP Trojans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Rajamanikkam et al [ 169 ] focused on an important threat in 3PIP: the architecture state preservation HT (TASP), and proposed three complementary techniques to detect the HT at a lower cost.…”
Section: The Prediction Of Future Trendmentioning
confidence: 99%
See 1 more Smart Citation
“…Rajamanikkam et al [ 169 ] focused on an important threat in 3PIP: the architecture state preservation HT (TASP), and proposed three complementary techniques to detect the HT at a lower cost.…”
Section: The Prediction Of Future Trendmentioning
confidence: 99%
“…Rajamanikkam et al [169] focused on an important threat in 3PIP: the architecture state preservation HT (TASP), and proposed three complementary techniques to detect the HT at a lower cost. Some are extremely novel methods: Liu et al [170] analyzed the combined structural characteristics of the HT and the main circuit and proposed a new HT detection technology.…”
Section: Specific Hts Protection Techniquesmentioning
confidence: 99%