Security against hardware Trojan through a novel application of design obfuscation
暂无分享,去创建一个
[1] Farid N. Najm,et al. Statistical Estimation of the Switching Activity in Digital Circuitsy , 1994, 31st Design Automation Conference.
[2] Arlindo L. Oliveira. Robust techniques for watermarking sequential circuit designs , 1999, DAC '99.
[3] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[4] Sally Adee,et al. The Hunt For The Kill Switch , 2008, IEEE Spectrum.
[5] S. Bhunia,et al. Hardware protection and authentication through netlist level obfuscation , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[6] Mark Mohammad Tehranipoor,et al. Power supply signal calibration techniques for improving detection resolution to hardware Trojans , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[7] Swarup Bhunia,et al. Hardware protection and authentication through netlist level obfuscation , 2008, ICCAD 2008.
[8] Christos A. Papachristou,et al. MERO: A Statistical Approach for Hardware Trojan Detection , 2009, CHES.