BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
trojan (3)
behavior (2)
hardwar (2)
user (2)
design (2)

Stem stealthi$ (all stems)

6 papers:

DATEDATE-2015-DupuisBFNR #hardware #testing
New testing procedure for finding insertion sites of stealthy hardware trojans (SD, PSB, MLF, GDN, BR), pp. 776–781.
DACDAC-2014-RudraDNH #case study #design #logic
Designing Stealthy Trojans with Sequential Logic: A Stream Cipher Case Study (MRR, NAD, VN, DHKH), p. 4.
DACDAC-2014-TsoutsosKM #design #hardware
Advanced Techniques for Designing Stealthy Hardware Trojans (NGT, CK, MM), p. 4.
ICSEICSE-2014-HuangZTWL #android #behaviour #detection #named #user interface
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction (JH, XZ, LT, PW, BL), pp. 1036–1046.
WCREWCRE-2011-Raber #debugging #kernel #profiling
Stealthy Profiling and Debugging of Malware Trampolining from User to Kernel Space (JR), pp. 431–432.
Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs (CSC, CDT, DL), pp. 184–196.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.