共 50 条
- [1] Advanced Techniques for Designing Stealthy Hardware Trojans 2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
- [2] Stealthy dopant-level hardware trojans Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 8086 LNCS : 197 - 214
- [3] Stealthy Dopant-Level Hardware Trojans CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 197 - 214
- [4] DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans PROCEEDINGS OF THE 12TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2023, 2023, : 47 - 55
- [6] DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 153 - 166
- [7] An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2019, 35 (06): : 839 - 852
- [8] An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size Journal of Electronic Testing, 2019, 35 : 839 - 852
- [10] DELTA: DEsigning a steaLthy trigger mechanism for analog hardware Trojans and its detection Analysis PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, 2022, : 787 - 792