T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing
Main Authors: | Trippel, Timothy, Shin, Kang, Bush, Kevin, Hicks, Matthew |
---|---|
Other Authors: | Lincoln Laboratory |
Format: | Article |
Language: | English |
Published: |
ACM|ACM ASIA Conference on Computer and Communications Security
2023
|
Online Access: | https://hdl.handle.net/1721.1/152145 |
Similar Items
-
The AEGIS Processor Architecture for Tamper-Evident and Tamper-Resistant Processing
by: Suh, G. Edward, et al.
Published: (2023) -
The AEGIS Processor Architecture for Tamper-Evident and Private Tamper-Resistant Enviorments
by: Suh, G. Edward, et al.
Published: (2023) -
Author restrospective AEGIS: architecture for tamper-evident and tamper-resistant processing
by: Suh, G. Edward, et al.
Published: (2021) -
Author restrospective AEGIS: architecture for tamper-evident and tamper-resistant processing
by: Suh, G. Edward, et al.
Published: (2021) -
Defeatism defeated
by: Baker-Hytch, M, et al.
Published: (2016)