共 15 条
[2]
Trojan detection using IC fingerprinting
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:296-+
[3]
[Anonymous], SPEC CPU2006
[4]
A region based approach for the identification of hardware Trojans
[J].
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2008,
:40-47
[5]
BLOOM G, 2009, COMPUTERS SECURITY
[6]
On-demand transparency for improving hardware Trojan detectability
[J].
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2008,
:48-50
[8]
Gerum P., 2004, Xenomai - Implementing a RTOS emulation framework on GNU/Linux
[9]
Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049
[10]
King S., 2008, Pink Ribbons, P1