共 39 条
- [1] Dipta D.R., Gulmezoglu B., MAD-EN: Microarchitectural attack detection through system-wide energy consumption, IEEE Trans. Inf. Forensics Security, 18, pp. 3006-3017, (2023)
- [2] Fadiheh M.R., Wezel A., Muller J., Bormann J., Ray S., Fung J.M., Mitra S., Stoffel D., Kunz W., An exhaustive approach to detecting transient execution side channels in RTL designs of processors, IEEE Trans. Comput., 72, 1, pp. 222-235, (2023)
- [3] Skorobogatov S., Woods C., Breakthrough silicon scanning discovers backdoor in military chip, Cryptographic Hardware and Embedded Systems, pp. 23-40, (2012)
- [4] Tehranipoor M., Koushanfar F., Asurvey of hardware trojan taxonomy and detection, IEEE Des. Test Comput., 27, 1, pp. 10-25, (2010)
- [5] Chakraborty R.S., Bhunia S., HARPOON: An obfuscation-based SoC design methodology for hardware protection, IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., 28, 10, pp. 1493-1502, (2009)
- [6] Karmakar R., Jana S.S., Chattopadhyay S., A cellular automata guided finite-state-machine watermarking strategy for IP protection of sequential circuits, IEEE Trans. Emerg. Topics Comput., 10, 2, pp. 806-823, (2022)
- [7] Roy J.A., Koushanfar F., Markov I.L., EPIC: Ending piracy of integrated circuits, Proc. Design, Autom. Test Eur. (DATE), pp. 1069-1074, (2008)
- [8] Karageorgos I., Isgenc M.M., Pagliarini S., Pileggi L., Chipto-chip authentication method based on SRAM PUF and public key cryptography, J. Hardw. Syst. Secur., 3, 4, pp. 382-396, (2019)
- [9] Aloseel A., He H., Shaw C., Khan M.A., Analytical review of cybersecurity for embedded systems, IEEE Access, 9, pp. 961-982, (2021)
- [10] Embrey B., The top three factors driving zero trust adoption, Comput. Fraud Secur., 2020, 9, pp. 13-15, (2020)