共 22 条
- [1] Trojan detection using IC fingerprinting [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
- [2] Alkabani Y., 2012, 2012 15th Euromicro Conference on Digital System Design (DSD 2012), P177, DOI 10.1109/DSD.2012.134
- [3] [Anonymous], IEEE INT S SOFTW REL
- [4] [Anonymous], IEEE EUR C CIRC THEO
- [5] [Anonymous], [No title captured]
- [6] VITAMIN: Voltage Inversion Technique to Ascertain Malicious Insertions in ICs [J]. 2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 104 - 107
- [7] Hardware Trojan Horses in Cryptographic IP Cores [J]. 2013 10TH WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2013), 2013, : 15 - 29
- [8] Hardware Trojan Attacks: Threat Analysis and Countermeasures [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247
- [9] On-demand transparency for improving hardware Trojan detectability [J]. 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 48 - 50
- [10] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2011, 27 (06): : 767 - 785