Back to Results
First PageMeta Content
Digital electronics / Electronic design / Electronic design automation / Field-programmable gate array / Circuit / Negated AND gate / OR gate / Hardware Trojan / Electronic engineering / Logic gates / Design


Defeating UCI: Building Stealthy and Malicious Hardware Cynthia Sturton University of California, Berkeley Matthew Hicks
Add to Reading List

Document Date: 2015-01-21 19:48:40


Open Document

File Size: 224,07 KB

Share Result on Facebook

Company

UCI / Xilinx / SPARC International / /

Country

United States / /

Facility

David Wagner University of California / Malicious Hardware Cynthia Sturton University of California / Berkeley Matthew Hicks University of Illinois / Building Stealthy / Berkeley Samuel T. King University of Illinois / /

IndustryTerm

search defeat / untrustworthy hardware / malicious hardware / software stack / systematic search / malicious circuit / open-source processor / above search multiple times / separate search / security-critical hardware / algorithmic search / search criteria / software-level attack / search algorithm / search results / /

OperatingSystem

Linux / /

Organization

University of Illinois / University of Illinois / Urbana-Champaign / US Federal Reserve / University of California / Berkeley / United States government / /

Person

Urbana-Champaign Figure / /

Position

rogue designer / supervisor / simple and straight forward / representative / /

ProvinceOrState

Illinois / California / /

Technology

FPGA / open-source processor / search algorithm / Linux / Circuits Our search algorithm / Leon3 processor / operating system / /

URL

http /

SocialTag