Amanote Research
Register
Sign In
Defeating UCI: Building Stealthy and Malicious Hardware
doi 10.1109/sp.2011.32
Full Text
Open PDF
Abstract
Available in
full text
Date
May 1, 2011
Authors
Cynthia Sturton
Matthew Hicks
David Wagner
Samuel T. King
Publisher
IEEE
Related search
Stealthy SS7 Attacks
Journal of ICT Standardization
Management
Computer Networks
Communications
Computer Science Applications
Innovation
Management of Technology
Information Systems
Demographic Consequences of Defeating Aging
Rejuvenation Research
Aging
Gerontology
Geriatrics
Defeating Phenomenal Conservatism
Philosophical Books
Defeating Phenomenal Conservatism
Analytic Philosophy
Power Electronics Building Blocks, "Plug and Play", Hardware and Software Control Architectures
From Self-Defeating to Other Defeating: Examining the Effects of Leader Procrastination on Follower Work Outcomes
Journal of Occupational and Organizational Psychology
Human Resource Management
Applied Psychology
Organizational Behavior
Defeating the Digital Divide
Mount Royal Undergraduate Education Review
An-Encoding Compiler: Building Safety-Critical Systems With Commodity Hardware
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Revealing Stealthy Attacks in Control Systems