Robustness analysis of crosstalk-based hardware Trojans and relevant algorithms to nonideal positioning
暂无分享,去创建一个
F. Grassi | G. Spadacini | S. A. Pignari | K. Yuan | S. Pignari | G. Spadacini | F. Grassi | K. Yuan
[1] Qiang Cui,et al. Estimation of eavesdropping distance from conducted emission on network cable of a PC , 2012, 2012 6th Asia-Pacific Conference on Environmental Electromagnetics (CEEM).
[2] W. V. Eck. Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? , 1996 .
[3] Yu-ichi Hayashi,et al. Analysis of EM emission from cryptographic devices , 2014, 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS).
[4] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[5] Flavia Grassi,et al. Crosstalk-Sensitive Loops and Reconstruction Algorithms to Eavesdrop Digital Signals Transmitted Along Differential Interconnects , 2017, IEEE Transactions on Electromagnetic Compatibility.