Design Comparison to Identify Malicious Hardware in External Intellectual Property

Author(s):  
Trey Reece ◽  
Daniel B. Limbrick ◽  
William H. Robinson
Author(s):  
Mark J. Davison ◽  
Ann L. Monotti ◽  
Leanne Wiseman

Sign in / Sign up

Export Citation Format

Share Document