共 46 条
[1]
[Anonymous], 2022, PROJECTROSENBRIDGE
[2]
[Anonymous], 2022, RISCV BENCHMARKS
[3]
Becker GT, 2013, LECT NOTES COMPUT SC, V8086, P197, DOI 10.1007/978-3-642-40349-1_12
[5]
Bhasin Shivam, 2015, 2015 IEEE International Symposium on Circuits and Systems (ISCAS). Proceedings, P2021, DOI 10.1109/ISCAS.2015.7169073
[6]
OS Support for Detecting Trojan Circuit Attacks
[J].
2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2009,
:100-103
[7]
A Microprocessor Protection Architecture against Hardware Trojans in Memories
[J].
2020 15TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2020),
2020,
[8]
Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems
[J].
2018 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR),
2018,
[10]
Chuan X, 2017, 2017 2ND IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUITS AND MICROSYSTEMS (ICICM), P91, DOI 10.1109/ICAM.2017.8242145