2019
DOI: 10.1109/mdat.2018.2873446
|View full text |Cite
|
Sign up to set email alerts
|

Upgrade/Downgrade: Efficient and Secure Legacy Electronic System Replacement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Furthermore, once the functionality is deduced and the netlist is reconstructed, any desired upgrades (additional logic, security primitives, etc.) can be added to the design and the new upgraded design and layout are ready for fabrication [33].…”
Section: B Obsolescencementioning
confidence: 99%
“…Furthermore, once the functionality is deduced and the netlist is reconstructed, any desired upgrades (additional logic, security primitives, etc.) can be added to the design and the new upgraded design and layout are ready for fabrication [33].…”
Section: B Obsolescencementioning
confidence: 99%
“…It is very critical point for decision makers to calculate return on investment of modernization. But in military domain, upgrading the system sometimes is inevitable due to national or international standards and regulations, so that, managers must be handle the cost challenges [16].…”
Section: Figure 2 Distribution Of Studies Over Countrymentioning
confidence: 99%
“…Legacy systems can cause vulnerability and must be upgraded [9]. Modernization should be done with long operational lifespans in mind, because, there can be cases of unknown vulnerabilities of design that appear in years [16]. For this reason, security profiling and possible vulnerabilities can be analyzed and handled carefully [18].…”
Section: Figure 2 Distribution Of Studies Over Countrymentioning
confidence: 99%
See 2 more Smart Citations