Red Team vs. Blue Team Hardware Trojan Analysis: Detection of a Hardware Trojan on an Actual ASIC

Michael Muehlberghuber, Frank K. Gurkaynak, Thomas Korak, Philipp Dunst, Michael Hutter

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Original languageEnglish
Title of host publicationHardware and Architectural Support for Security and Privacy - HASP 2013, Second Workshop, Tel-Aviv, Israel, June 23, 2013, Proceedings.
Place of PublicationNew York, NY, USA
PublisherAssociation of Computing Machinery
Pages1-8
ISBN (Print)978-1-4503-2118-1
Publication statusPublished - 2013
EventWorkshop on Hardware and Architectural Support for Security and Privacy - Tel-Aviv, Israel
Duration: 23 Jun 201323 Jun 2013

Conference

ConferenceWorkshop on Hardware and Architectural Support for Security and Privacy
CountryIsrael
CityTel-Aviv
Period23/06/1323/06/13

Fields of Expertise

  • Information, Communication & Computing

Cite this

Muehlberghuber, M., Gurkaynak, F. K., Korak, T., Dunst, P., & Hutter, M. (2013). Red Team vs. Blue Team Hardware Trojan Analysis: Detection of a Hardware Trojan on an Actual ASIC. In Hardware and Architectural Support for Security and Privacy - HASP 2013, Second Workshop, Tel-Aviv, Israel, June 23, 2013, Proceedings. (pp. 1-8). New York, NY, USA: Association of Computing Machinery.