共 9 条
[1]
Ahmed Q. A., 2019, LECT NOTES COMPUTER, V1444
[2]
Malicious Routing: Circumventing Bitstream-level Verification for FPGAs
[J].
PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021),
2021,
:1490-1495
[4]
Proof-carrying Hardware: Towards Runtime Verification of Reconfigurable Modules
[J].
2009 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS,
2009,
:189-194
[5]
Malicious LUT: A Stealthy FPGA Trojan Injected and Triggered by the Design Flow
[J].
2016 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD),
2016,
[6]
Suozzo M., 2013, P 2013 ACM SIGSAC C, P697
[7]
Wiersema T, 2014, PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), P167, DOI 10.1109/FPT.2014.7082771
[8]
Wolf C., 2015, Project icestorm
[9]
Zhang J, 2013, 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P107, DOI 10.1109/HST.2013.6581574