A Novel Method for Malicious Implanted Computer Video Cable Detection via Electromagnetic Features
暂无分享,去创建一个
Weiqing Huang | Yanyun Xu | Zhaowen Feng | Ning Zhang | Wei-qing Huang | Yanyun Xu | Zhaowen Feng | Ning Zhang
[1] Fatih Karabacak,et al. Remote detection of unauthorized activity via spectral analysis: work-in-progress , 2017, CODES+ISSS.
[2] Ingrid Verbauwhede,et al. Electromagnetic circuit fingerprints for Hardware Trojan detection , 2015, 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC).
[3] Jeyavijayan Rajendran,et al. Hardware security: Threat models and metrics , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[4] Yiqiang Zhao,et al. Golden chip free Trojan detection leveraging electromagnetic side channel fingerprinting , 2019, IEICE Electron. Express.
[5] Sylvain Guilley,et al. Hardware Trojan detection by delay and electromagnetic measurements , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[6] Mordechai Guri,et al. USBee: Air-gap covert-channel via electromagnetic emission from USB , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[7] Apostolos P. Fournaris,et al. An efficient multi-parameter approach for FPGA hardware Trojan detection , 2019, Microprocess. Microsystems.
[8] Ahmad Taher Azar,et al. Performance analysis of support vector machines classifiers in breast cancer mammography recognition , 2013, Neural Computing and Applications.
[9] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[10] Lan Chen,et al. Application of SVM Machine Learning to Hardware Trojan Detection Using Side-channel Analysis , 2020 .
[11] Degang Sun,et al. Computer recognition based on the compromising emanations fingerprint , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[12] Harold Joseph Highland,et al. Electromagnetic radiation revisited , 1986, Computers & security.
[13] Jianxin Wang,et al. A hardware Trojan detection method based on the electromagnetic leakage , 2019, China Communications.
[14] N. Huang,et al. The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis , 1998, Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.
[15] Takeshi Kumaki,et al. Detection technique for hardware Trojans using machine learning in frequency domain , 2015, 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE).
[16] Youhua Shi,et al. Hardware Trojan Detection Utilizing Machine Learning Approaches , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[17] Markus G. Kuhn,et al. Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.
[18] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.