共 50 条
- [22] A hardware Trojans design using the correlation analysis of electromagnetic emanation Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (10): : 22 - 25
- [24] Smart Employment of Circuit Redundancy to Effectively Counter Trojans (SECRET) in Third-Party IP Cores 2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,
- [25] HLIFT: A High-level Information Flow Tracking Method for Detecting Hardware Trojans 2018 23RD ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2018, : 727 - 732
- [26] Analysis of Data-Leak Hardware Trojans in AES Cryptographic Circuits 2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2013, : 467 - 472
- [27] Under the Dome: Preventing Hardware Timing Information Leakage SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 233 - 253
- [28] Sensitivity analysis to hardware Trojans using power supply transient signals 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 3 - +
- [29] Qualitative and Quantitative Analysis of Information Leakage in Java']Java Source Code NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 338 - 342
- [30] The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs 2020 IEEE EUROPEAN TEST SYMPOSIUM (ETS 2020), 2020,