共 30 条
[1]
Trojan detection using IC fingerprinting
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:296-+
[2]
[Anonymous], 2019, TRUSTHUB
[3]
[Anonymous], 2019, ZABER
[4]
Balasch J, 2015, IEEE INT SYMP ELEC, P246, DOI 10.1109/ISEMC.2015.7256167
[5]
A region based approach for the identification of hardware Trojans
[J].
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2008,
:40-47
[6]
VITAMIN: Voltage Inversion Technique to Ascertain Malicious Insertions in ICs
[J].
2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2009,
:104-107
[9]
Hardware Trojan: Threats and Emerging Solutions
[J].
2009 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP,
2009,
:166-171
[10]
Exploiting Switching of Transistors in Digital Electronics for RFID Tag Design
[J].
IEEE JOURNAL OF RADIO FREQUENCY IDENTIFICATION,
2019, 3 (02)
:67-76