A hardware Trojan embedded in the Inverse Widlar reference generator
暂无分享,去创建一个
Randall L. Geiger | Qianqian Wang | Degang J. Chen | Xing Cao | R. Geiger | Degang Chen | Qianqian Wang | Xing Cao
[1] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[2] Randall L. Geiger,et al. Challenges and opportunities for determining presence of multiple equilibrium points with circuit simulators , 2014, 2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS).
[3] Degang Chen,et al. Practical methods for verifying removal of Trojan stable operating points , 2013, 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013).
[4] Randall L. Geiger,et al. Temperature signatures for performance assessment of circuits with undesired equilibrium states , 2015 .
[5] Susmit Jha,et al. Randomization Based Probabilistic Approach to Detect Trojan Circuits , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.
[6] G. Wilson. A monolithic junction FET-n-p-n operational amplifier , 1968 .
[7] Michael S. Hsiao,et al. A region based approach for the identification of hardware Trojans , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[8] Degang Chen,et al. A programmable temperature trigger circuit , 2015, 2015 IEEE International Symposium on Circuits and Systems (ISCAS).
[9] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[10] Jie Li,et al. At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.