Now showing items 1-1 of 1

    • Reusing Logic Masking to Facilitate Hardware Trojan Detection 

      Nejat, Arash; Hely, David; Beroulle, Vincent (2016-11-16)
      Conference report
      Open Access
      Hardware Trojan (HT) and Integrated Circuit (IC)/ Intellectual Property (IP) piracy are important threats which may happen in untrusted fabrication foundries. Modifying structurally the ICs/IPs design to counter the HT ...