共 50 条
- [1] DELTA: DEsigning a steaLthy trigger mechanism for analog hardware Trojans and its detection Analysis PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, 2022, : 787 - 792
- [2] Advanced Techniques for Designing Stealthy Hardware Trojans 2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
- [3] Stealthy dopant-level hardware trojans Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 8086 LNCS : 197 - 214
- [4] Stealthy Dopant-Level Hardware Trojans CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 197 - 214
- [6] DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 153 - 166
- [7] New Testing Procedure for Finding Insertion Sites of Stealthy Hardware Trojans 2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 776 - 781
- [8] An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2019, 35 (06): : 839 - 852
- [9] An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size Journal of Electronic Testing, 2019, 35 : 839 - 852
- [10] Testability of cryptographic hardware and detection of Hardware Trojans Proceedings of the Asian Test Symposium, 2011, : 517 - 524