Cited By
View all- Mahmoud DShokry BLenders VHu WStojilović M(2024)X-Attack 2.0: The Risk of Power Wasters and Satisfiability Don’t-Care Hardware Trojans to Shared Cloud FPGAsIEEE Access10.1109/ACCESS.2024.335313412(8983-9011)Online publication date: 2024
- McKendrick RFaulkner KGoeders J(2023)Assuring Netlist-to-Bitstream Equivalence using Physical Netlist Generation and Structural Comparison2023 International Conference on Field Programmable Technology (ICFPT)10.1109/ICFPT59805.2023.00021(142-151)Online publication date: 12-Dec-2023
- Krieg C(2023)Reflections on Trusting TrustHUB2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)10.1109/ICCAD57390.2023.10323782(1-9)Online publication date: 28-Oct-2023
- Show More Cited By