共 19 条
- [1] AdamWaksman Matthew Suozzo, 2013, P 2013 ACM SIGSAC C, P697
- [3] Bhandari J., 2021, INT C COMP AID DES
- [4] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2011, 27 (06): : 767 - 785
- [5] Cruz J, 2018, DES AUT TEST EUROPE, P1598, DOI 10.23919/DATE.2018.8342270
- [6] Hardware Trojan Detection using ATPG and Model Checking [J]. 2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, : 91 - 96
- [8] Dupuis S, 2014, IEEE INT ON LINE, P49, DOI 10.1109/IOLTS.2014.6873671
- [9] Faezi S, 2021, PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), P1484, DOI 10.23919/DATE51398.2021.9474076
- [10] Hoque T, 2018, INT TEST CONF P