Towards system-level adversary attack surface modeling for microelectronics trust
暂无分享,去创建一个
[1] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.
[2] P. Athanas,et al. How Threats Drive the Development of Secure Reconfigurable Devices , 2008, 2008 IEEE National Aerospace and Electronics Conference.
[3] Simha Sethumadhavan,et al. FANCI: identification of stealthy malicious logic using boolean functional analysis , 2013, CCS.
[4] Marten van Dijk,et al. HaTCh : A Formal Framework of Hardware Trojan Design and Detection , 2015 .
[5] Jonathan Graf. Trust games: How game theory can guide the development of hardware Trojan detection methods , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[6] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[7] Jie Zhang,et al. VeriTrust: Verification for Hardware Trust , 2015, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[8] Jie Zhang,et al. DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans , 2014, CCS.
[9] Dimitris Gritzalis,et al. Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game? , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.