Session 2.2: Trojan Horse Detection for RISC-V Cores Using Cross-Auditing Author(s): Siang-Cheng Huang, Shi-Yu Huang Location: Taiwan Year: 2024 Type: Presentation Format: pdf Download