Code-Controlled Hardware Trojan Horse

Hongbo Gao, QingBao Li, Yu Zhu, Yong Liu. Code-Controlled Hardware Trojan Horse. In Chunfeng Liu, Leizhen Wang, Aimin Yang, editors, Information Computing and Applications - Third International Conference, ICICA 2012, Chengde, China, September 14-16, 2012. Proceedings, Part II. Volume 308 of Communications in Computer and Information Science, pages 171-178, Springer, 2012. [doi]

@inproceedings{GaoLZL12a,
  title = {Code-Controlled Hardware Trojan Horse},
  author = {Hongbo Gao and QingBao Li and Yu Zhu and Yong Liu},
  year = {2012},
  doi = {10.1007/978-3-642-34041-3_26},
  url = {http://dx.doi.org/10.1007/978-3-642-34041-3_26},
  researchr = {https://researchr.org/publication/GaoLZL12a},
  cites = {0},
  citedby = {0},
  pages = {171-178},
  booktitle = {Information Computing and Applications - Third International Conference, ICICA 2012, Chengde, China, September 14-16, 2012. Proceedings, Part II},
  editor = {Chunfeng Liu and Leizhen Wang and Aimin Yang},
  volume = {308},
  series = {Communications in Computer and Information Science},
  publisher = {Springer},
  isbn = {978-3-642-34040-6},
}