Amanote Research

Amanote Research

    RegisterSign In

Defeating UCI: Building Stealthy and Malicious Hardware

doi 10.1109/sp.2011.32
Full Text
Open PDF
Abstract

Available in full text

Date

May 1, 2011

Authors
Cynthia SturtonMatthew HicksDavid WagnerSamuel T. King
Publisher

IEEE


Related search

Stealthy SS7 Attacks

Journal of ICT Standardization
ManagementComputer NetworksCommunicationsComputer Science ApplicationsInnovationManagement of TechnologyInformation Systems
2017English

Demographic Consequences of Defeating Aging

Rejuvenation Research
AgingGerontologyGeriatrics
2010English

Defeating Phenomenal Conservatism

Philosophical Books
2011English

Defeating Phenomenal Conservatism

Analytic Philosophy
2011English

Power Electronics Building Blocks, "Plug and Play", Hardware and Software Control Architectures

2004English

From Self-Defeating to Other Defeating: Examining the Effects of Leader Procrastination on Follower Work Outcomes

Journal of Occupational and Organizational Psychology
Human Resource ManagementApplied PsychologyOrganizational Behavior
2018English

Defeating the Digital Divide

Mount Royal Undergraduate Education Review
2015English

An-Encoding Compiler: Building Safety-Critical Systems With Commodity Hardware

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Revealing Stealthy Attacks in Control Systems

2012English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy