Over the last two decades we have become dependent on a network of electronic devices that supports a plethora of services, ranging from delivery of entertainment and news to maintenance of business records to filing of legal forms. This network provides a robust platform to handle all kinds of sensitive information at the personal, corporate, or government levels. Furthermore, many physical systems, e.g., the power grid, are currently being connected and to some extent controlled by commands relayed over the very same network. In essence the network permeates and blends into the physical infrastructure.
CITATION STYLE
Tehranipoor, M., & Sunar, B. (2010). Hardware trojan horses. In Information Security and Cryptography (Vol. 0, pp. 167–187). Springer International Publishing. https://doi.org/10.1007/978-3-642-14452-3_7
Mendeley helps you to discover research relevant for your work.