咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 3 篇 电子科学与技术(可...
    • 2 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 冶金工程
    • 1 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 2 篇 数学

主题

  • 1 篇 wire
  • 1 篇 functional analy...

机构

  • 2 篇 institute of mic...
  • 2 篇 institute of inf...
  • 2 篇 department of co...
  • 2 篇 state key labora...
  • 2 篇 key lab. of inte...
  • 2 篇 school of inform...
  • 1 篇 computer archite...
  • 1 篇 department of el...
  • 1 篇 computer archite...

作者

  • 2 篇 sethumadhavan si...
  • 2 篇 hui yu
  • 2 篇 xiaochun ye
  • 2 篇 dongrui fan
  • 2 篇 weizhi xu
  • 2 篇 da wang
  • 2 篇 songwei pei
  • 2 篇 dianjie lu
  • 2 篇 waksman adam
  • 2 篇 suozzo matthew
  • 2 篇 fenglong song
  • 2 篇 hongtao xie
  • 1 篇 rajendran jeyavi...

语言

  • 4 篇 英文
检索条件"机构=Computer Architecture and Security Technologies Lab"
4 条 记 录,以下是1-10 订阅
排序:
A red team/blue team assessment of functional analysis methods for malicious circuit identification  14
A red team/blue team assessment of functional analysis metho...
收藏 引用
51st Annual Design Automation Conference, DAC 2014
作者: Waksman, Adam Rajendran, Jeyavijayan Suozzo, Matthew Sethumadhavan, Simha Computer Architecture and Security Technologies Lab Department of Computer Science Columbia University New York NY United States Department of Electrical and Computer Engineering New York University New York NY United States
Recent advances in hardware security have led to the development of FANCI (Functional Analysis for Nearly-Unused Circuit Identification), an analysis algorithm that identifies stealthy, malicious circuits within hardw... 详细信息
来源: 评论
FANCI: Identification of stealthy malicious logic using boolean functional analysis  13
FANCI: Identification of stealthy malicious logic using bool...
收藏 引用
2013 ACM SIGSAC Conference on computer and Communications security, CCS 2013
作者: Waksman, Adam Suozzo, Matthew Sethumadhavan, Simha Computer Architecture and Security Technologies Lab. Department of Computer Science Columbia University New York NY United States
Hardware design today bears similarities to software design. Often vendors buy and integrate code acquired from third-party organizations into their designs, especially in embedded/system-on-chip designs. Currently, t... 详细信息
来源: 评论
Corrigendum to “Fast and scalable lock methods for video coding on many-core architecture” [J. Vis. Commun. Image R. 25(7) (2014) 1758–1762]
收藏 引用
Journal of Visual Communication and Image Representation 2015年 27卷 57-57页
作者: Weizhi Xu Hui Yu Dianjie Lu Fenglong Song Da Wang Xiaochun Ye Songwei Pei Dongrui Fan Hongtao Xie Institute of Microelectronics Tsinghua University Beijing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Information Science and Engineering Shandong Normal University Jinan China Department of Computer Science and Technology Beijing University of Chemical Technology Beijing China Institute of Information Engineering Chinese Academy of Sciences National Engineering Laboratory for Information Security Technologies Beijing China
来源: 评论
Corrigendum to “Fast and scalable lock methods for video coding on many-core architecture” [J. Vis. Commun. 25 (7) (2014) 1758–1762]
收藏 引用
Journal of Visual Communication and Image Representation 2015年 26卷 350-350页
作者: Weizhi Xu Hui Yu Dianjie Lu Fenglong Song Da Wang Xiaochun Ye Songwei Pei Dongrui Fan Hongtao Xie Institute of Microelectronics Tsinghua University Beijing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Information Science and Engineering Shandong Normal University Jinan China Department of Computer Science and Technology Beijing University of Chemical Technology Beijing China Institute of Information Engineering Chinese Academy of Sciences National Engineering Laboratory for Information Security Technologies Beijing China
来源: 评论