Trustworthy hardware from untrusted components
Communications of the ACM(2015)
摘要
This defense-in-depth approach uses static analysis and runtime mechanisms to detect and silence hardware backdoors.
更多查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要