共 11 条
[1]
Designer's hardware Trojan horse
[J].
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2008,
:82-83
[2]
Hardware Trojan: Threats and Emerging Solutions
[J].
2009 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP,
2009,
:166-171
[3]
Gunti NB, 2015, IEEE SOUTHEASTCON
[4]
He CH, 2014, I C RELIABIL MAINTAI, P1043, DOI 10.1109/ICRMS.2014.7107362
[5]
Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049
[6]
Experiences in Hardware Trojan Design and Implementation
[J].
2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2009,
:50-+
[7]
Lin L., 2009, 11 INT WORKSH CRYPT
[9]
Ngo XT, 2015, DES AUT TEST EUROPE, P782
[10]
Wang Li-Wei, 2011, POWER ANAL BASED APP