@inproceedings{da9d5982dc84446281916aea54d8012a,
title = "University research in hardware security",
abstract = "This article consists of a collection of slides from the author's conference presentation on hardware security. Some of the specific topics discussed include: examples of using Moving Target Defense for Secure Hardware design (DHS/AFRL project); system performance evaluations; network security considerations; secure processors; dynamic information flow tracking; software-hardware security verification; security measurement techniques; typs of security attacks; supply chain security options; hardware trojans; security CAD tools; trust management issues; cyber-physical systems; and secure software design, new problems and solutions.",
author = "Lee, {Ruby B.}",
note = "Publisher Copyright: {\textcopyright} 2014 IEEE.; 26th IEEE Hot Chips Symposium, HCS 2014 ; Conference date: 10-08-2014 Through 12-08-2014",
year = "2014",
month = may,
day = "25",
doi = "10.1109/HOTCHIPS.2014.7478799",
language = "English (US)",
series = "2014 IEEE Hot Chips 26 Symposium, HCS 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "2014 IEEE Hot Chips 26 Symposium, HCS 2014",
address = "United States",
}