Designing and Implementing Malicious Hardware
Submitted by giantrabbit on February 9, 2021 - 5:38 am
Title | Designing and Implementing Malicious Hardware |
Publication Type | Conference Paper |
Year of Publication | 2008 |
Authors | King ST, Tucek J, Cozzie A, Grier C, Jiang W, Zhou Y |
Conference Name | First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08) |
Date Published | 04/2008 |
Publisher | USENIX Association |
Conference Location | San Francisco, CA |
URL | https://www.usenix.org/conference/leet-08/designing-and-implementing-malicious-hardware |
- DBLP
- Log in or Register to post comments
- Google Scholar
- BibTeX