[{"date_created":"2024-10-17T12:48:24Z","title":"Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan","user_id":"220548","type":"conference","publication_identifier":{"issn":["0302-9743"],"eisbn":["978-3-030-17227-5"],"isbn":["978-3-030-17226-8"],"eissn":["1611-3349"]},"publication":"Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings","series_title":"Lecture Notes in Computer Science","publication_status":"published","status":"public","conference":{"start_date":"2019-04-09","end_date":"2019-04-11","location":"Darmstadt, Germany","name":"Applied Reconfigurable Computing. 15th International Symposium, ARC 2019"},"citation":{"short":"Q.A. Ahmed, T. Wiersema, M. Platzner, in: C. Hochberger, B. Nelson, A. Koch, R. Woods, P. Diniz (Eds.), Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings, Springer International Publishing, Cham, 2019, pp. 127–136.","chicago":"Ahmed, Qazi Arbab, Tobias Wiersema, and Marco Platzner. “Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan.” In <i>Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings</i>, edited by Christian Hochberger, Brent Nelson, Andreas Koch, Roger Woods, and Pedro Diniz, 127–36. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2019. <a href=\"https://doi.org/10.1007/978-3-030-17227-5_10\">https://doi.org/10.1007/978-3-030-17227-5_10</a>.","mla":"Ahmed, Qazi Arbab, et al. “Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan.” <i>Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings</i>, edited by Christian Hochberger et al., Springer International Publishing, 2019, pp. 127–36, doi:<a href=\"https://doi.org/10.1007/978-3-030-17227-5_10\">10.1007/978-3-030-17227-5_10</a>.","ama":"Ahmed QA, Wiersema T, Platzner M. Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan. In: Hochberger C, Nelson B, Koch A, Woods R, Diniz P, eds. <i>Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings</i>. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2019:127-136. doi:<a href=\"https://doi.org/10.1007/978-3-030-17227-5_10\">10.1007/978-3-030-17227-5_10</a>","ieee":"Q. A. Ahmed, T. Wiersema, and M. Platzner, “Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan,” in <i>Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings</i>, Darmstadt, Germany, 2019, pp. 127–136.","alphadin":"<span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Wiersema, Tobias</span> ; <span style=\"font-variant:small-caps;\">Platzner, Marco</span>: Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan. In: <span style=\"font-variant:small-caps;\">Hochberger, C.</span> ; <span style=\"font-variant:small-caps;\">Nelson, B.</span> ; <span style=\"font-variant:small-caps;\">Koch, A.</span> ; <span style=\"font-variant:small-caps;\">Woods, R.</span> ; <span style=\"font-variant:small-caps;\">Diniz, P.</span> (Hrsg.): <i>Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings</i>, <i>Lecture Notes in Computer Science</i>. Cham : Springer International Publishing, 2019, S. 127–136","bibtex":"@inproceedings{Ahmed_Wiersema_Platzner_2019, place={Cham}, series={Lecture Notes in Computer Science}, title={Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-17227-5_10\">10.1007/978-3-030-17227-5_10</a>}, booktitle={Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings}, publisher={Springer International Publishing}, author={Ahmed, Qazi Arbab and Wiersema, Tobias and Platzner, Marco}, editor={Hochberger, Christian and Nelson, Brent and Koch, Andreas and Woods, Roger and Diniz, PedroEditors}, year={2019}, pages={127–136}, collection={Lecture Notes in Computer Science} }","apa":"Ahmed, Q. A., Wiersema, T., &#38; Platzner, M. (2019). Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan. In C. Hochberger, B. Nelson, A. Koch, R. Woods, &#38; P. Diniz (Eds.), <i>Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings</i> (pp. 127–136). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-030-17227-5_10\">https://doi.org/10.1007/978-3-030-17227-5_10</a>"},"author":[{"id":"257333","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169760877","first_name":"Qazi Arbab","last_name":"Ahmed","full_name":"Ahmed, Qazi Arbab","orcid":"0000-0002-1837-2254"},{"last_name":"Wiersema","full_name":"Wiersema, Tobias","first_name":"Tobias"},{"first_name":"Marco","full_name":"Platzner, Marco","last_name":"Platzner"}],"place":"Cham","date_updated":"2026-03-17T15:29:13Z","page":"127-136","publisher":"Springer International Publishing","doi":"10.1007/978-3-030-17227-5_10","language":[{"iso":"eng"}],"editor":[{"full_name":"Hochberger, Christian","last_name":"Hochberger","first_name":"Christian"},{"first_name":"Brent","last_name":"Nelson","full_name":"Nelson, Brent"},{"first_name":"Andreas","last_name":"Koch","full_name":"Koch, Andreas"},{"first_name":"Roger","full_name":"Woods, Roger","last_name":"Woods"},{"first_name":"Pedro","last_name":"Diniz","full_name":"Diniz, Pedro"}],"_id":"5059","year":"2019"}]
