This book describes techniques to verify the authenticity of integrated circuits (ICs). It details a variety of detection schemes and design methodologies for improving Trojan detection techniques.
Read More
This book describes techniques to verify the authenticity of integrated circuits (ICs). It details a variety of detection schemes and design methodologies for improving Trojan detection techniques.
Read Less