共 14 条
[1]
ADEE S., The hunt for the kill switch
[2]
Trojan detection using IC fingerprinting
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:296-+
[3]
[Anonymous], 2008, MATH STAT APPL
[4]
[Anonymous], P IEEE ACM INT C COM
[5]
[Anonymous], DEF SCI BOARD TASK F
[6]
[Anonymous], P IEEE INT WORKSH HA
[7]
A Novel Sustained Vector Technique for the Detection of Hardware Trojans
[J].
22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS,
2009,
:327-332
[8]
Bushnell M., 2000, ESSENTIALS ELECT TES
[9]
Randomization Based Probabilistic Approach to Detect Trojan Circuits
[J].
11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS,
2008,
:117-+
[10]
Li J, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P8, DOI 10.1109/HST.2008.4559038