共 18 条
[1]
[Anonymous], 2010, 14592010 IEEE, P1, DOI [DOI 10.1109/IEEESTD.2010.5439063, 10.1109/IEEESTD.2010.5399061, DOI 10.1109/IEEESTD.2010.5553440, 10.1109/IEEESTD.2010.5594972Cited, DOI 10.1109/IEEESTD.2010.5399061]
[2]
[Anonymous], 2015, PROC GREAT LAKES S V
[3]
A region based approach for the identification of hardware Trojans
[J].
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2008,
:40-47
[6]
CAKIR B, 2015, AUT TEST EUROPE, P471
[7]
Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
[J].
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS,
2011, 27 (06)
:767-785
[8]
Forte D, 2013, ICCAD-IEEE ACM INT, P532, DOI 10.1109/ICCAD.2013.6691167
[9]
PSL: Beyond hardware verification
[J].
NEXT GENERATION DESIGN AND VERIFICATION METHODOLOGIES FOR DISTRIBUTED EMBEDDED CONTROL SYSTEMS,
2007,
:245-+
[10]
Hategekimana Festus, 2015, 2015 International Conference on Reconfigurable Computing and FPGAs (ReConFig), P1, DOI 10.1109/ReConFig.2015.7393319