共 22 条
- [1] Trojan detection using IC fingerprinting [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
- [2] Hardware Trojan Attacks: Threat Analysis and Countermeasures [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247
- [3] Goldstein L. H., 1980, Proceedings of the 17th Design Automation Conference, P190, DOI 10.1145/800139.804528
- [4] Hasegawa K., 2018, International Conference on Consumer Electronics, P1, DOI [10.1109/ICCE.2018.8326247, DOI 10.1109/ICCE.2018.8326247]
- [5] Hasegawa K, 2017, IEEE INT SYMP CIRC S, P2154
- [6] Hasegawa K, 2017, IEEE INT ON LINE, P227, DOI 10.1109/IOLTS.2017.8046227
- [8] Hasegawa K, 2016, IEEE INT ON LINE, P203, DOI 10.1109/IOLTS.2016.7604700
- [10] Survey of Recent Developments for Hardware Trojan Detection [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,