Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/isca/MuehlberghuberGKDH13
%A Muehlberghuber, Michael
%A Gürkaynak, Frank K.
%A Korak, Thomas
%A Dunst, Philipp
%A Hutter, Michael
%B HASP@ISCA
%D 2013
%E Lee, Ruby B.
%E Shi, Weidong
%I ACM
%K dblp
%P 1
%T Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC.
%U http://dblp.uni-trier.de/db/conf/isca/hasp2013.html#MuehlberghuberGKDH13
%@ 978-1-4503-2118-1
@inproceedings{conf/isca/MuehlberghuberGKDH13,
added-at = {2018-11-06T00:00:00.000+0100},
author = {Muehlberghuber, Michael and Gürkaynak, Frank K. and Korak, Thomas and Dunst, Philipp and Hutter, Michael},
biburl = {https://www.bibsonomy.org/bibtex/26ca109aec27b6fd23592ccb7e4bd54be/dblp},
booktitle = {HASP@ISCA},
crossref = {conf/isca/2013hasp},
editor = {Lee, Ruby B. and Shi, Weidong},
ee = {https://doi.org/10.1145/2487726.2487727},
interhash = {234138f0bd0d961aa63b92268991ac10},
intrahash = {6ca109aec27b6fd23592ccb7e4bd54be},
isbn = {978-1-4503-2118-1},
keywords = {dblp},
pages = 1,
publisher = {ACM},
timestamp = {2024-04-10T01:42:25.000+0200},
title = {Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC.},
url = {http://dblp.uni-trier.de/db/conf/isca/hasp2013.html#MuehlberghuberGKDH13},
year = 2013
}