---
_id: '5051'
author:
- first_name: Qazi Arbab
  full_name: Ahmed, Qazi Arbab
  id: '257333'
  last_name: Ahmed
  orcid: 0000-0002-1837-2254
  orcid_put_code_url: https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169760864
- first_name: Tobias
  full_name: Wiersema, Tobias
  last_name: Wiersema
- first_name: Marco
  full_name: Platzner, Marco
  last_name: Platzner
citation:
  alphadin: '<span style="font-variant:small-caps;">Ahmed, Qazi Arbab</span> ; <span
    style="font-variant:small-caps;">Wiersema, Tobias</span> ; <span style="font-variant:small-caps;">Platzner,
    Marco</span>: Post-configuration Activation of Hardware Trojans in FPGAs. In:
    <i>Journal of Hardware and Systems Security</i> Bd. 8, Springer Science and Business
    Media LLC (2024), Nr. 2, S. 79–93'
  ama: Ahmed QA, Wiersema T, Platzner M. Post-configuration Activation of Hardware
    Trojans in FPGAs. <i>Journal of Hardware and Systems Security</i>. 2024;8(2):79-93.
    doi:<a href="https://doi.org/10.1007/s41635-024-00147-5">10.1007/s41635-024-00147-5</a>
  apa: Ahmed, Q. A., Wiersema, T., &#38; Platzner, M. (2024). Post-configuration Activation
    of Hardware Trojans in FPGAs. <i>Journal of Hardware and Systems Security</i>,
    <i>8</i>(2), 79–93. <a href="https://doi.org/10.1007/s41635-024-00147-5">https://doi.org/10.1007/s41635-024-00147-5</a>
  bibtex: '@article{Ahmed_Wiersema_Platzner_2024, title={Post-configuration Activation
    of Hardware Trojans in FPGAs}, volume={8}, DOI={<a href="https://doi.org/10.1007/s41635-024-00147-5">10.1007/s41635-024-00147-5</a>},
    number={2}, journal={Journal of Hardware and Systems Security}, publisher={Springer
    Science and Business Media LLC}, author={Ahmed, Qazi Arbab and Wiersema, Tobias
    and Platzner, Marco}, year={2024}, pages={79–93} }'
  chicago: 'Ahmed, Qazi Arbab, Tobias Wiersema, and Marco Platzner. “Post-Configuration
    Activation of Hardware Trojans in FPGAs.” <i>Journal of Hardware and Systems Security</i>
    8, no. 2 (2024): 79–93. <a href="https://doi.org/10.1007/s41635-024-00147-5">https://doi.org/10.1007/s41635-024-00147-5</a>.'
  ieee: Q. A. Ahmed, T. Wiersema, and M. Platzner, “Post-configuration Activation
    of Hardware Trojans in FPGAs,” <i>Journal of Hardware and Systems Security</i>,
    vol. 8, no. 2, pp. 79–93, 2024.
  mla: Ahmed, Qazi Arbab, et al. “Post-Configuration Activation of Hardware Trojans
    in FPGAs.” <i>Journal of Hardware and Systems Security</i>, vol. 8, no. 2, Springer
    Science and Business Media LLC, 2024, pp. 79–93, doi:<a href="https://doi.org/10.1007/s41635-024-00147-5">10.1007/s41635-024-00147-5</a>.
  short: Q.A. Ahmed, T. Wiersema, M. Platzner, Journal of Hardware and Systems Security
    8 (2024) 79–93.
date_created: 2024-10-17T12:40:30Z
date_updated: 2026-03-17T15:29:13Z
doi: 10.1007/s41635-024-00147-5
intvolume: '         8'
issue: '2'
language:
- iso: eng
page: 79-93
publication: Journal of Hardware and Systems Security
publication_identifier:
  eissn:
  - 2509-3436
  issn:
  - 2509-3428
publication_status: published
publisher: Springer Science and Business Media LLC
status: public
title: Post-configuration Activation of Hardware Trojans in FPGAs
type: journal_article
user_id: '220548'
volume: 8
year: '2024'
...
