共 38 条
[1]
Aas J., 2005, Understanding the Linux 2.6.8.1 CPU Scheduler
[2]
Advanced Micro Devices, 1999, 33047 AMD CORP
[3]
Trojan detection using IC fingerprinting
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:296-+
[4]
Designer's hardware Trojan horse
[J].
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2008,
:82-83
[5]
Binkert Nathan, 2011, Computer Architecture News, V39, P1, DOI 10.1145/2024716.2024718
[6]
Charette R. N., THIS CAR RUNS CODE
[7]
Chess B., 1994, Proceedings 12th IEEE VLSI Test Symposium (Cat. No.94TH0645-2), P446, DOI 10.1109/VTEST.1994.292275
[9]
Davi L, 2011, LECT NOTES COMPUT SC, V6531, P346
[10]
Digital Equipment Corporation, 1999, TECH REP