共 29 条
[2]
A region based approach for the identification of hardware Trojans
[J].
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2008,
:40-47
[3]
A Novel Sustained Vector Technique for the Detection of Hardware Trojans
[J].
22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS,
2009,
:327-332
[6]
Chakraborty RS, 2009, LECT NOTES COMPUT SC, V5747, P396
[7]
Hardware Trojan Detection using ATPG and Model Checking
[J].
2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES),
2018,
:91-96
[8]
Hardware Trojan Detection by Stimulating Transitions in Rare Nets
[J].
2019 32ND INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2019 18TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID),
2019,
:537-538
[9]
Du DD, 2010, LECT NOTES COMPUT SC, V6225, P173, DOI 10.1007/978-3-642-15031-9_12
[10]
Goldstein L. H., 1980, Proceedings of the 17th Design Automation Conference, P190, DOI 10.1145/800139.804528