Show simple item record

dc.contributor.authorTrippel, Timothy
dc.contributor.authorShin, Kang
dc.contributor.authorBush, Kevin
dc.contributor.authorHicks, Matthew
dc.date.accessioned2023-09-13T18:44:03Z
dc.date.available2023-09-13T18:44:03Z
dc.date.issued2023-07-10
dc.identifier.isbn979-8-4007-0098-9
dc.identifier.urihttps://hdl.handle.net/1721.1/152145
dc.publisherACM|ACM ASIA Conference on Computer and Communications Securityen_US
dc.relation.isversionofhttps://doi.org/10.1145/3579856.3582837en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceAssociation for Computing Machineryen_US
dc.titleT-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routingen_US
dc.typeArticleen_US
dc.identifier.citationTrippel, Timothy, Shin, Kang, Bush, Kevin and Hicks, Matthew. 2023. "T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing."
dc.contributor.departmentLincoln Laboratory
dc.identifier.mitlicensePUBLISHER_POLICY
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2023-08-01T07:48:15Z
dc.language.rfc3066en
dc.rights.holderThe author(s)
dspace.date.submission2023-08-01T07:48:15Z
mit.licensePUBLISHER_POLICY
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record