共 42 条
- [1] Trojan detection using IC fingerprinting [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
- [2] [Anonymous], 2019, DPRO 100 MHZ REFEREN
- [3] [Anonymous], 2019, MULTIPLIERS VDI MODE
- [4] [Anonymous], 2019, WR2 8SHM SUBHARMONIC
- [5] [Anonymous], 2019, FREQUENCY MULTIPLIER
- [6] [Anonymous], 2003, COMPROMISING EMANATI
- [7] Backes M., 2010, USENIX SECURITY S, P307
- [8] Bayrak AG, 2011, DES AUT CON, P230
- [9] A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events [J]. 2014 47TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2014, : 242 - 254
- [10] Callan Robert., 2016, P 25 INT S SOFTWARE, P401, DOI [DOI 10.1145/2931037.2931065, 10.1145/2931037.2931065]