共 42 条
[1]
Trojan detection using IC fingerprinting
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:296-+
[2]
[Anonymous], 2019, DPRO 100 MHZ REFEREN
[3]
[Anonymous], 2019, MULTIPLIERS VDI MODE
[4]
[Anonymous], 2019, WR2 8SHM SUBHARMONIC
[5]
[Anonymous], 2019, FREQUENCY MULTIPLIER
[6]
[Anonymous], 2003, COMPROMISING EMANATI
[7]
Backes M., 2010, USENIX SECURITY S, P307
[8]
Bayrak AG, 2011, DES AUT CON, P230
[9]
A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events
[J].
2014 47TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO),
2014,
:242-254
[10]
Callan Robert., 2016, P 25 INT S SOFTWARE, P401, DOI [DOI 10.1145/2931037.2931065, 10.1145/2931037.2931065]