Hardware Trojans in asynchronous FIFO-buffers: From clock domain crossing perspective
暂无分享,去创建一个
[1] Jie Zhang,et al. VeriTrust: Verification for hardware trust , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).
[2] Pong P. Chu. RTL Hardware Design Using VHDL: Coding for Efficiency, Portability, and Scalability , 2006 .
[3] Guy Lemieux,et al. A Survey and Taxonomy of GALS Design Styles , 2007, IEEE Design & Test of Computers.
[4] Mark Mohammad Tehranipoor,et al. Hardware Trojan Horses , 2010, Towards Hardware-Intrinsic Security.
[5] Erik Jan Marinissen,et al. Design and DfT of a High-Speed Area-Efficient Embedded Asynchronous FIFO , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.
[6] Mark Mohammad Tehranipoor,et al. A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay , 2013, IEEE Design & Test.
[7] Farinaz Koushanfar,et al. ClockPUF: Physical Unclonable Functions based on clock networks , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[8] Syed Rafay Hasan,et al. Inter-module Interfacing techniques for SoCs with multiple clock domains to address challenges in modern deep sub-micron technologies , 2009 .
[9] Mark Mohammad Tehranipoor,et al. A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[10] Christof Paar,et al. Stealthy dopant-level hardware Trojans: extended version , 2014, Journal of Cryptographic Engineering.