共 50 条
[21]
Stealth Assessment of Hardware Trojans in a Microcontroller
[J].
2012 IEEE 30TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD),
2012,
:139-142
[22]
Thermal Scans for Detecting Hardware Trojans
[J].
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2018,
2018, 10815
:117-132
[23]
An Attribute Based Classification of Hardware Trojans
[J].
2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES),
2015,
:351-356
[24]
Test Generation for Combinational Hardware Trojans
[J].
PROCEEDINGS OF THE 2016 IEEE ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST 2016),
2016,
[26]
Exploiting hardware obfuscation methods to prevent and detect hardware Trojans
[J].
Midwest Symposium on Circuits and Systems,
2017, 2017-August
:819-822
[27]
Hardware Trojans in Wireless Cryptographic ICs
[J].
IEEE DESIGN & TEST OF COMPUTERS,
2010, 27 (01)
:26-35
[29]
Hardware Trojans: Threats, Detection, and Prevention
[J].
ACM International Conference Proceeding Series,
2023,
:529-533
[30]
Can overclocking detect hardware trojans?
[J].
Proceedings - IEEE International Symposium on Circuits and Systems,
2021, 2021-May