Abstract: The wide usage of hardware intellectual property (IP) cores from untrusted vendors has raised security concerns in the integrated circuit (IC) industry. Existing testing methods are designed ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results