Efficient hardware trojan diagnosis in SRAM based on FPGA processors using inject detect masking algorithm for multimedia signal Processors
暂无分享,去创建一个
[1] Yiyu Shi,et al. Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding , 2018, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[2] Yu Wang,et al. A General Framework for Hardware Trojan Detection in Digital Circuits by Statistical Learning Algorithms , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[3] Laurent Njilla,et al. Thwarting Security Threats From Malicious FPGA Tools With Novel FPGA-Oriented Moving Target Defense , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[4] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[5] Yu Wang,et al. Hardware Trojan Detection in Third-Party Digital Intellectual Property Cores by Multilevel Feature Analysis , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[6] Omer Khan,et al. Advancing the State-of-the-Art in Hardware Trojans Detection , 2019, IEEE Transactions on Dependable and Secure Computing.
[7] Yiqiang Zhao,et al. Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[8] Saiyu Ren,et al. Self-Reference-Based Hardware Trojan Detection , 2018, IEEE Transactions on Semiconductor Manufacturing.
[9] Jian Wang,et al. Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method , 2019, IEEE Access.
[10] Jimson Mathew,et al. A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis , 2017, IEEE Transactions on Emerging Topics in Computing.
[11] Huawei Li,et al. LMDet: A “Naturalness” Statistical Method for Hardware Trojan Detection , 2018, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[12] Swarup Bhunia,et al. Scalable Test Generation for Trojan Detection Using Side Channel Analysis , 2018, IEEE Transactions on Information Forensics and Security.
[13] Pedro Reviriego,et al. Protecting Image Processing Pipelines against Configuration Memory Errors in SRAM-Based FPGAs , 2018 .
[14] Muhammad Rashid,et al. A high performance processor architecture for multimedia applications , 2018, Comput. Electr. Eng..
[15] Yang Yang,et al. A Multi-Layer Hardware Trojan Protection Framework for IoT Chips , 2019, IEEE Access.
[16] Tsutomu Matsumoto,et al. A Demonstration of a HT-Detection Method Based on Impedance Measurements of the Wiring Around ICs , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.
[17] Ahmad Patooghy,et al. Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs , 2018, IET Comput. Digit. Tech..
[18] Walid Saad,et al. Hardware Trojan Detection Game: A Prospect-Theoretic Approach , 2017, IEEE Transactions on Vehicular Technology.
[19] Swarup Bhunia,et al. Hardware Trojan attacks in embedded memory , 2018, 2018 IEEE 36th VLSI Test Symposium (VTS).