Hardware Trojans in Reconfigurable Computing

2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)(2021)

引用 1|浏览0
暂无评分
摘要
The design flow for field-programmable gate arrays (FPGAs), besides conventional methods of inserting Trojans into a design by a malicious entity, can also be surreptitiously compromised to assist an attacker to perform a successful malfunctioning or information leakage attack. The advanced stealthy malicious look-up-table (LUT) attack activates a Trojan only when generating the FPGA bitstream and...
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要