共 23 条
[1]
Acharya A, 2009, INT CONF PERVAS COMP, P11
[2]
Trojan detection using IC fingerprinting
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:296-+
[3]
Alkabani Yousra, 2009, Proceedings of the 2009 IEEE/ACM International Conference on Computer-Aided Design (ICCAD 2009), P123, DOI 10.1145/1687399.1687426
[4]
[Anonymous], US MAN
[5]
[Anonymous], 2008, MATH STAT APPL
[6]
[Anonymous], DEF SCI BOARD TASK F
[7]
[Anonymous], 2008, IEEE SPECTRUM
[8]
Banga M., 2008, P 18 ACM GREAT LAK S, P363, DOI [DOI 10.1145/1366110.1366196, 10.1145/13661101366196]
[9]
A region based approach for the identification of hardware Trojans
[J].
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2008,
:40-47
[10]
A Novel Sustained Vector Technique for the Detection of Hardware Trojans
[J].
22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS,
2009,
:327-332