Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST
Crossref DOI link: https://doi.org/10.1007/s11265-016-1127-4
Published Online: 2016-03-11
Published Print: 2017-06
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Dubrova, Elena
Näslund, Mats
Carlsson, Gunnar
Fornehed, John
Smeets, Ben
Funding for this research was provided by:
Stiftelsen för Strategisk Forskning (SM14-0016)
Text and Data Mining valid from 2016-03-11