共 43 条
- [1] Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
- [2] Trojan detection using IC fingerprinting [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
- [3] Ahmed MM, 2017, CSI INT SYMP COMPUT, P12, DOI 10.1109/CESYS.2017.8321253
- [4] Alam M, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P585
- [5] [Anonymous], 2012, DE1 DEV ED BOARD
- [6] [Anonymous], 2013, A13 OL MICR
- [7] [Anonymous], 2016, SMA 4 4 HOL PAN REC
- [8] [Anonymous], 2015, C RAM SFC 4
- [9] Backes M., 2010, USENIX SECURITY S, P307
- [10] FASE: Finding Amplitude-modulated Side-channel Emanations [J]. 2015 ACM/IEEE 42ND ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA), 2015, : 592 - 603