咨询与建议

限定检索结果

文献类型

  • 2 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 2 篇 软件工程

主题

  • 3 篇 em emission
  • 3 篇 iot security
  • 3 篇 hardware/firmwar...

机构

  • 1 篇 arizona state un...
  • 1 篇 arizona state un...
  • 1 篇 intel 5000 w cha...
  • 1 篇 arizona state un...
  • 1 篇 arizona state un...

作者

  • 2 篇 karabacak fatih
  • 2 篇 ozev sule
  • 2 篇 ogras umit
  • 1 篇 sule ozev
  • 1 篇 umit ogras
  • 1 篇 fatih karabacak

语言

  • 3 篇 英文
检索条件"主题词=Hardware/Firmware Trojan Detection"
3 条 记 录,以下是1-10 订阅
排序:
Remote detection of Unauthorized Activity via Spectral Analysis
收藏 引用
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS 2018年 第6期23卷 1–21页
作者: Karabacak, Fatih Ogras, Umit Ozev, Sule Arizona State Univ Tempe AZ 85281 USA Intel 5000 W Chandler Blvd Chandler AZ 85226 USA Arizona State Univ ISTB4 Tempe AZ 85281 USA
Unauthorized hardware or firmware modifications, known as trojans, can steal information, drain the battery, or damage IoT devices. Since trojans may be triggered in the field at an unknown instance, it is important t... 详细信息
来源: 评论
Work-in-Progress: Remote detection of Unauthorized Activity via Spectral Analysis  12
Work-in-Progress: Remote Detection of Unauthorized Activity ...
收藏 引用
International Conference on hardware/Software Codesign and System Synthesis (CODES+ISSS)
作者: Karabacak, Fatih Ogras, Umit Ozev, Sule Arizona State Univ Sch ECEE Tempe AZ 85281 USA
Unauthorized hardware or firmware modifications, known as trojans, can steal information, drain the battery, or damage IoT devices. This paper presents a stand-off self-referencing technique for detecting unauthorized... 详细信息
来源: 评论
Remote detection of unauthorized activity via spectral analysis: work-in-progress  17
Remote detection of unauthorized activity via spectral analy...
收藏 引用
Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on hardware/Software Codesign and System Synthesis Companion
作者: Fatih Karabacak Umit Ogras Sule Ozev Arizona State University
Unauthorized hardware or firmware modifications, known as trojans, can steal information, drain the battery, or damage IoT devices. This paper presents a stand-off self-referencing technique for detecting unauthorized... 详细信息
来源: 评论