Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/nsdi/KingTCGJZ08
%A King, Samuel T.
%A Tucek, Joseph A.
%A Cozzie, Anthony
%A Grier, Chris
%A Jiang, Weihang
%A Zhou, Yuanyuan
%B LEET
%D 2008
%E Monrose, Fabian
%I USENIX Association
%K dblp
%T Designing and Implementing Malicious Hardware.
%U http://dblp.uni-trier.de/db/conf/nsdi/leet2008.html#KingTCGJZ08
@inproceedings{conf/nsdi/KingTCGJZ08,
added-at = {2023-10-12T00:00:00.000+0200},
author = {King, Samuel T. and Tucek, Joseph A. and Cozzie, Anthony and Grier, Chris and Jiang, Weihang and Zhou, Yuanyuan},
biburl = {https://www.bibsonomy.org/bibtex/2f35c3e7dbb138ae2954e044314c4e186/dblp},
booktitle = {LEET},
crossref = {conf/nsdi/2008leet},
editor = {Monrose, Fabian},
ee = {http://www.usenix.org/events/leet08/tech/full_papers/king/king.pdf},
interhash = {88fa7ba3450ac743b50c495e61564d49},
intrahash = {f35c3e7dbb138ae2954e044314c4e186},
keywords = {dblp},
publisher = {USENIX Association},
timestamp = {2024-04-10T17:03:03.000+0200},
title = {Designing and Implementing Malicious Hardware.},
url = {http://dblp.uni-trier.de/db/conf/nsdi/leet2008.html#KingTCGJZ08},
year = 2008
}