Statistical screening for IC Trojan detection
暂无分享,去创建一个
[1] John P. Hayes,et al. Unveiling the ISCAS-85 Benchmarks: A Case Study in Reverse Engineering , 1999, IEEE Des. Test Comput..
[2] H. T. Kung,et al. DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements , 2011, HotSec.
[3] YalcinHakan,et al. Unveiling the ISCAS-85 Benchmarks , 1999 .
[4] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[5] Ranga Vemuri,et al. Accurate estimation of vector dependent leakage power in the presence of process variations , 2009, 2009 IEEE International Conference on Computer Design.
[6] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[7] Miodrag Potkonjak,et al. SVD-Based Ghost Circuitry Detection , 2009, Information Hiding.