共 36 条
[3]
Hardware Trojan: Threats and Emerging Solutions
[J].
2009 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP,
2009,
:166-171
[4]
Security Threats and Countermeasures in Three-Dimensional Integrated Circuits
[J].
PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17),
2017,
:321-326
[5]
A multi-level architecture for hardware Trojan and vulnerability runtime detection and response towards cryptographic IP
[J].
IEICE ELECTRONICS EXPRESS,
2022, 19 (11)
[7]
Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection
[J].
PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022),
2022,
:236-241
[8]
Gomes Wilfred, 2022, 2022 IEEE International Solid- State Circuits Conference (ISSCC), P42, DOI 10.1109/ISSCC42614.2022.9731673
[9]
Guimaraes Leonel Acunha, 2017, 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). Proceedings, P290, DOI 10.1109/ISVLSI.2017.58