Low overhead design for improving hardware trojan detection efficiency
暂无分享,去创建一个
Saiyu Ren | Shuo Li | Hao Xue | Xiaomeng Zhang | Tyler Moody
[1] Michael S. Hsiao,et al. A region based approach for the identification of hardware Trojans , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[2] Hongwei Luo,et al. Design of hardware trojan horse based on counter , 2011, 2011 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering.
[3] K. Ramachandran,et al. Mathematical Statistics with Applications. , 1992 .
[4] Mark Mohammad Tehranipoor,et al. Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis , 2008, 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems.
[5] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[6] Hao Xue. Timing and Power Optimization Using Mixed-Dynamic-Static CMOS , 2013 .
[7] Swarup Bhunia,et al. On-demand transparency for improving hardware Trojan detectability , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[8] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[9] Mark Mohammad Tehranipoor,et al. A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[10] Christos A. Papachristou,et al. Process reliability based trojans through NBTI and HCI effects , 2010, 2010 NASA/ESA Conference on Adaptive Hardware and Systems.
[11] Miodrag Potkonjak,et al. CAD-based Security, Cryptography, and Digital Rights Management , 2007, 2007 44th ACM/IEEE Design Automation Conference.