2018
DOI: 10.1007/978-3-319-93563-8_13
|View full text |Cite
|
Sign up to set email alerts
|

Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…In practical applications, the impact of HTs is receiving attention [ 7 ]. Some articles designed or considered some potential HTs from the attacker’s point of view and put forward solutions to these HTs [ 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ]. Some researchers applied HTs to the real environment and designed a scheme to defend it [ 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 ].…”
Section: Introductionmentioning
confidence: 99%
“…In practical applications, the impact of HTs is receiving attention [ 7 ]. Some articles designed or considered some potential HTs from the attacker’s point of view and put forward solutions to these HTs [ 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ]. Some researchers applied HTs to the real environment and designed a scheme to defend it [ 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 ].…”
Section: Introductionmentioning
confidence: 99%