共 15 条
[1]
Bloom G, 2015, 2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P48, DOI 10.1109/HST.2015.7140235
[3]
Drimer S., 2008, Volatile FPGA Design Security-A Survey
[4]
Hadzic I., 1999, Field Programmable Logic and Applications. 9th International Workshop, FPL'99. Proceedings (Lecture Notes in Computer Science Vol.1673), P291
[5]
Hallmans D, 2015, IEEE INTL CONF IND I, P208, DOI 10.1109/INDIN.2015.7281736
[6]
Jyothi V, 2016, PR IEEE COMP DESIGN, P600, DOI 10.1109/ICCD.2016.7753346
[7]
Karam R., 2016, 2016 INT C RECONFIGU, P1, DOI DOI 10.1109/SCEECS.2016.7509283
[8]
Karam R, 2017, ASIA S PACIF DES AUT, P611, DOI 10.1109/ASPDAC.2017.7858391
[9]
Design and Validation for FPGA Trust under Hardware Trojan Attacks
[J].
IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS,
2016, 2 (03)
:186-198
[10]
Hardware Trojan Attacks in FPGA Devices: Threat Analysis and Effective Countermeasures
[J].
GLSVLSI'14: PROCEEDINGS OF THE 2014 GREAT LAKES SYMPOSIUM ON VLSI,
2014,
:287-292