共 24 条
- [2] [Anonymous], 2009, P 5 ANN WORKSH CYB S
- [3] A Novel Sustained Vector Technique for the Detection of Hardware Trojans [J]. 22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, : 327 - 332
- [4] Hardware Trojan Attacks: Threat Analysis and Countermeasures [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247
- [5] OS Support for Detecting Trojan Circuit Attacks [J]. 2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 100 - 103
- [7] Chakraborty RS, 2009, LECT NOTES COMPUT SC, V5747, P396
- [8] Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 159 - 172
- [10] Randomization Based Probabilistic Approach to Detect Trojan Circuits [J]. 11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 117 - +