Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC

Michael Muehlberghuber, Frank K. Gürkaynak, Thomas Korak, Philipp Dunst, Michael Hutter. Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC. In Ruby B. Lee, Weidong Shi, editors, HASP 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013. pages 1, ACM, 2013. [doi]

Abstract

Abstract is missing.