共 25 条
[1]
Trojan detection using IC fingerprinting
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:296-+
[2]
[Anonymous], 2005, REP DEF SCI BOARD TA
[3]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[4]
Canright D, 2005, LECT NOTES COMPUT SC, V3659, P441
[5]
Gierlichs B, 2008, LECT NOTES COMPUT SC, V5154, P426
[7]
Hamburg Mike, 2012, TECHNICAL REPORT
[8]
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
[J].
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2010,
:159-172
[9]
Intel, INT DIG RAND NUMB GE
[10]
Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049