共 30 条
- [1] Trojan detection using IC fingerprinting [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
- [2] [Anonymous], 2013, 22 USENIX SEC S USEN
- [3] Balasch J, 2015, IEEE INT SYMP ELEC, P246, DOI 10.1109/ISEMC.2015.7256167
- [4] Becker GT, 2013, LECT NOTES COMPUT SC, V8086, P197, DOI 10.1007/978-3-642-40349-1_12
- [5] Ernst D, 2003, 36TH INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, PROCEEDINGS, P7
- [6] Forte D, 2013, ICCAD-IEEE ACM INT, P532, DOI 10.1109/ICCAD.2013.6691167
- [7] MiBench: A free, commercially representative embedded benchmark suite [J]. WWC-4: IEEE INTERNATIONAL WORKSHOP ON WORKLOAD CHARACTERIZATION, 2001, : 3 - 14
- [8] Hicks M., 2010, USENIX LOGIN, V35, P31
- [9] Hicks M, 2015, ACM SIGPLAN NOTICES, V50, P517, DOI [10.1145/2694344.2694366, 10.1145/2775054.2694366]
- [10] Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049