Exploiting the Analog Properties of Digital Circuits For Malicious Hardware
We show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small and stealthy.
Exploiting the Analog Properties of Digital Circuits For Malicious Hardware
Centip3De: A Many-Core Prototype Exploring 3D Integration and Near-Threshold Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved