MC8051-T700

Contributed by Hassan Salmani; University of Connecticut

Abstract:

The Trojan replaces some input data with some predefined data by an adversary.

[none]