A Noval Method of Security Verification for JTAG Protection Function
暂无分享,去创建一个
[1] Sergei Skorobogatov,et al. Breakthrough Silicon Scanning Discovers Backdoor in Military Chip , 2012, CHES.
[2] Wei Hu,et al. Detecting Hardware Trojans with Gate-Level Information-Flow Tracking , 2016, Computer.
[3] Yiorgos Makris,et al. Proof carrying-based information flow tracking for data secrecy protection and hardware trust , 2012, 2012 IEEE 30th VLSI Test Symposium (VTS).
[4] Ing. M. F. Breeuwsma. Forensic imaging of embedded systems using JTAG (boundary-scan) , 2006, Digit. Investig..
[5] Wei Hu,et al. Clepsydra: Modeling timing flows in hardware designs , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[6] Frederic T. Chong,et al. Complete information flow tracking from the gates up , 2009, ASPLOS.
[7] Jeyavijayan Rajendran,et al. Detecting malicious modifications of data in third-party intellectual property cores , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).