Cited By
View all- Dai RYavuz T(2024)Detecting Hardware Trojans using Model Guided Symbolic ExecutionProceedings of the Great Lakes Symposium on VLSI 202410.1145/3649476.3658782(569-573)Online publication date: 12-Jun-2024
- Albartus* NEnder* MMöller* JFyrbiak MPaar CTessier R(2024)On the Malicious Potential of Xilinx’s Internal Configuration Access Port (ICAP)ACM Transactions on Reconfigurable Technology and Systems10.1145/363320417:2(1-28)Online publication date: 30-Apr-2024
- Dharsee KCriswell JCalandrino JTroncoso C(2023)JinnProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620627(6965-6982)Online publication date: 9-Aug-2023
- Show More Cited By