共 15 条
[1]
Becker G.T., Regazzoni F., Paar C., Burleson W.P., Stealthy Dopant-Level Hardware Trojans, CHES 2013. LNCS, 8086, pp. 197-214, (2013)
[2]
Rosenkranz R., Failure Localization with Active and Passive Voltage Contrast in FIB and SEM, Journal of Materials Science: Materials in Electronics, 22, 10, pp. 1523-1535, (2011)
[3]
Shiozaki M., Hori R., Fujino T., Diffusion Programmable Device: The Device to Prevent Reverse Engineering, IACR Cryptology ePrint Archive 2014/109, (2014)
[4]
Nohl K., Evans D., Starbug, Plotz, H.: Reverse-Engineering a Cryptographic RFID Tag, Proceedings of the 17th USENIX Security Symposium, (2008)
[5]
Torrance R., James D., The State-of-the-Art in IC Reverse Engineering, CHES 2009. LNCS, 5747, pp. 363-381, (2009)
[6]
Slashdot, Stealthy Dopant-Level Hardware Trojans
[7]
Tarnovsky C., A (In)security of Commonly Found Smart Cards, Invited Talk II, CHES, (2012)
[8]
Boit C., Security Risks Posed by Modern IC Debug and Diagnosis Tools, Keynote Talk I, A 10th Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2013, (2013)
[9]
Kang S.M., Leblebici Y., CMOS Digital Integrated Circuits Analysis & Design, McGraw-Hill, (2002)
[10]
Reverse engineering integrated circuits with degate