共 25 条
[1]
Bhunia S., 2018, HARDWARE TROJAN WAR, DOI [10.1007/978-3-319-68511-3, DOI 10.1007/978-3-319-68511-3]
[2]
Cruz J, 2018, DES AUT TEST EUROPE, P1598, DOI 10.23919/DATE.2018.8342270
[3]
eecs, ISCAS High-Level Models
[4]
github, GitHub -TrojanForge-Adversarial-Hardware-Trojan-Examples: Hardware Trojan Benchmark-github.com
[5]
Gohil V., 2022, Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, P1275, DOI [10.1145/3548606.3560690, DOI 10.1145/3548606.3560690]
[6]
Gohil V, 2024, Arxiv, DOI arXiv:2402.13946
[7]
DETERRENT: Detecting Trojans using Reinforcement Learning
[J].
PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022,
2022,
:697-702
[8]
Hagberg Aric A., 2008, Proceedings_of_the_7th_Python_in_Science_Conference, P11
[10]
Reflections on Trusting TrustHUB
[J].
2023 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD,
2023,