共 28 条
[1]
Andreou A, 2017, 2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P155, DOI 10.1109/HST.2017.7951819
[2]
[Anonymous], 2016, EXTRACTING QUALCOMMS
[3]
Ardeshiricham A, 2017, ICCAD-IEEE ACM INT, P147, DOI 10.1109/ICCAD.2017.8203772
[4]
Ardeshiricham A, 2017, DES AUT TEST EUROPE, P1691, DOI 10.23919/DATE.2017.7927266
[5]
Deng S., 2017, IACR CRYPTOLOGY EPRI
[6]
Fern N, 2017, ASIA S PACIF DES AUT, P598, DOI 10.1109/ASPDAC.2017.7858389
[7]
Goguen J. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P11
[8]
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
[J].
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2010,
:159-172
[9]
Towards Property Driven Hardware Security
[J].
2016 17TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR AND SOC TEST AND VERIFICATION (MTV),
2016,
:51-56