共 31 条
- [1] Advanced Techniques for Designing Stealthy Hardware Trojans 2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
- [2] Stealthy dopant-level hardware trojans Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 8086 LNCS : 197 - 214
- [3] Defeating UCI: Building Stealthy and Malicious Hardware 2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 64 - 77
- [4] Stealthy Dopant-Level Hardware Trojans CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 197 - 214
- [5] DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans PROCEEDINGS OF THE 12TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2023, 2023, : 47 - 55
- [7] Towards Trust Hardware Deployment of Edge Computing: Mitigation of Hardware Trojans Based on Evolvable Hardware APPLIED SCIENCES-BASEL, 2022, 12 (13):
- [8] Constructing formal verification models for hardware Trojans Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 146 - 154
- [9] An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2019, 35 (06): : 839 - 852
- [10] New Testing Procedure for Finding Insertion Sites of Stealthy Hardware Trojans 2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 776 - 781