Session 2.2: Trojan Horse Detection for RISC-V Cores Using Cross-Auditing

Author(s):
Siang-Cheng Huang, Shi-Yu Huang