Trustworthy hardware from untrusted components

Communications of the ACM(2015)

引用 24|浏览105
暂无评分
摘要
This defense-in-depth approach uses static analysis and runtime mechanisms to detect and silence hardware backdoors.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要