Hardware trojan horses

3Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Over the last two decades we have become dependent on a network of electronic devices that supports a plethora of services, ranging from delivery of entertainment and news to maintenance of business records to filing of legal forms. This network provides a robust platform to handle all kinds of sensitive information at the personal, corporate, or government levels. Furthermore, many physical systems, e.g., the power grid, are currently being connected and to some extent controlled by commands relayed over the very same network. In essence the network permeates and blends into the physical infrastructure.

Cite

CITATION STYLE

APA

Tehranipoor, M., & Sunar, B. (2010). Hardware trojan horses. In Information Security and Cryptography (Vol. 0, pp. 167–187). Springer International Publishing. https://doi.org/10.1007/978-3-642-14452-3_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free