no code implementations • 2 Nov 2019 • Tolulope A. Odetola, Hawzhin Raoof Mohammed, Syed Rafay Hasan
In this paper, we introduce a hardware Trojan attack called Input Interception Attack (IIA).
Cloud Computing