Malicious combinational Hardware Trojan detection by Gate Level Characterization in 90nm technology
暂无分享,去创建一个
[1] Miodrag Potkonjak,et al. Gate-level characterization: Foundations and hardware security applications , 2010, Design Automation Conference.
[2] Miodrag Potkonjak,et al. Malicious Circuitry Detection Using Thermal Conditioning , 2011, IEEE Transactions on Information Forensics and Security.
[3] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.
[4] Miodrag Potkonjak,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS 1 Scalable Hardware Trojan Diagnosis , 2022 .
[5] Miodrag Potkonjak,et al. Hardware Trojan horse detection using gate-level characterization , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[6] Mark R. Beaumont,et al. Hardware Trojans - Prevention, Detection, Countermeasures (A Literature Review) , 2011 .
[7] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[8] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Anamika Thakur,et al. Hardware Trojan Detection-A Survey , 2013 .
[10] Swarup Bhunia,et al. Hardware Trojan: Threats and emerging solutions , 2009, 2009 IEEE International High Level Design Validation and Test Workshop.