Search Results

You are looking at 1 - 1 of 1 items for :

  • Computer Sciences, other x
Clear All
Open access

Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick Housley and Robert K. Cunningham

investigations into the alleged hacking of sim card encryption keys by britain’s government communications headquarters and the U.S. National Security Agency,” 2 2015. [49] J. Zhang, F. Yuan, and Q. Xu, “DeTrust: Defeating hardware trust verification with stealthy implicitly-triggered hardware trojans,” in CCS 2014. [50] S. Wei and M. Potkonjak, “The undetectable and unprovable hardware trojan horse,” in DAC 2013. [51] T. Bray, “Exercising our remote application removal feature,” http://android-developers.blogspot.com/2010