Loading…
Trustworthy hardware from untrusted components
This defense-in-depth approach uses static analysis and runtime mechanisms to detect and silence hardware backdoors.
Saved in:
Published in: | Communications of the ACM 2015-09, Vol.58 (9), p.60-71 |
---|---|
Main Authors: | , , , , |
Format: | Magazinearticle |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | This defense-in-depth approach uses static analysis and runtime mechanisms to detect and silence hardware backdoors. |
---|---|
ISSN: | 0001-0782 1557-7317 |
DOI: | 10.1145/2699412 |