共 19 条
[1]
Trojan detection using IC fingerprinting
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:296-+
[2]
[Anonymous], LOW POW EL DES IEEE
[3]
[Anonymous], CIRC SYST ISCAS P IE
[4]
[Anonymous], COMP AID DES ICCAD I
[5]
[Anonymous], USENIX WORKSH HOT TO
[6]
[Anonymous], 2010, IEEE Std 1685-2009, pC1
[7]
A Novel Sustained Vector Technique for the Detection of Hardware Trojans
[J].
22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS,
2009,
:327-332
[9]
Decoding by linear programming
[J].
IEEE TRANSACTIONS ON INFORMATION THEORY,
2005, 51 (12)
:4203-4215
[10]
Hardware Trojan: Threats and Emerging Solutions
[J].
2009 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP,
2009,
:166-171