共 33 条
[1]
Trojan detection using IC fingerprinting
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:296-+
[2]
[Anonymous], 2008, SAED EDK90 CORE 90 N
[3]
Fault dictionary size reduction through test response superposition
[J].
ICCD'2002: IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN: VLSI IN COMPUTERS AND PROCESSORS, PROCEEDINGS,
2002,
:480-485
[4]
A region based approach for the identification of hardware Trojans
[J].
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2008,
:40-47
[5]
Improved fault diagnosis in scan-based BIST via superposition
[J].
37TH DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2000,
2000,
:55-58
[6]
Chakraborty RS, 2009, LECT NOTES COMPUT SC, V5747, P396
[7]
Du DD, 2010, LECT NOTES COMPUT SC, V6225, P173, DOI 10.1007/978-3-642-15031-9_12
[8]
Forte D, 2013, ICCAD-IEEE ACM INT, P532, DOI 10.1109/ICCAD.2013.6691167
[9]
Hossain FS, 2018, INT TEST CONF P