Jeff Biggers

Learn More
To address the concern that a complete detection scheme for effective hardware Trojan identification is lacking, we have designed an RTL security metric in order to evaluate the quality of IP cores (with the same or similar functionality) and counter Trojan attacks at the pre-fabrication stages of the IP design flow. The proposed security metric is(More)
* This version was created in 1998 by optical character recognition from a scanned copy of the 1989 edition printed report to Microsoft Word 6, to provide an " accessible " copy of the document for computerized distribution. The word processing files used to create the original report are no longer available. Equations, figures/tables, and parts of the(More)
  • 1