Cited By
View all- Hepp APerez TPagliarini SSigl GMitra TYoung EXiong J(2022)A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized LayoutsProceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design10.1145/3508352.3549452(1-9)Online publication date: 30-Oct-2022
- Krachenfels TSeifert JTajik SHong Chang CRührmair UKatzenbeisser SMukhopadhyay D(2021)Trojan AwakenerProceedings of the 5th Workshop on Attacks and Solutions in Hardware Security10.1145/3474376.3487282(17-27)Online publication date: 19-Nov-2021
- Dhar TRoy SGiri C(2021)Hardware Trojan Horse Detection through Improved Switching of Dormant NetsACM Journal on Emerging Technologies in Computing Systems10.1145/343995117:3(1-22)Online publication date: 11-May-2021
- Show More Cited By