Advanced techniques for designing stealthy hardware trojans

Nektarios Georgios Tsoutsos, Charalambos Konstantinou, Michail Maniatakos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Scopus citations

Fingerprint

Dive into the research topics of 'Advanced techniques for designing stealthy hardware trojans'. Together they form a unique fingerprint.

Computer Science

Keyphrases