Access Restriction

Author Eum, Julianna ♦ Suozzo, Matthew ♦ Huang, Yipeng ♦ Waksman, Adam ♦ Sethumadhavan, Simha
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract This defense-in-depth approach uses static analysis and runtime mechanisms to detect and silence hardware backdoors.
Description Affiliation: The D. E. Shaw Group, New York (Waksman, Adam) || U.S. Military Academy at West Point, New York (Eum, Julianna) || Columbia University, New York (Sethumadhavan, Simha; Huang, Yipeng) || Chip Scan LLC, New York (Suozzo, Matthew)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 58
Issue Number 9
Page Count 12
Starting Page 60
Ending Page 71

Open content in new tab

   Open content in new tab
Source: ACM Digital Library