Conference Proceeding

A design methodology for stealthy parametric trojans and its application to bug attacks

Cryptographic Hardware and Embedded Systems – CHES 2016: 625–647
Sa­ma­neh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar (2016)
Subject(s): Information technology and systems
Keyword(s): Hardware Trojans, malicious hardware, layout modifications, bug attacks
Pages 625–647