Security-aware SoC test access mechanisms
暂无分享,去创建一个
[1] Yuanyuan Zhou,et al. Designing and Implementing Malicious Hardware , 2008, LEET.
[2] B. Preneel,et al. Trivium Specifications ? , 2022 .
[3] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[4] Dean R. Collins. TRUST, A Proposed Plan for Trusted Integrated Circuits , 2006 .
[5] John D. Villasenor,et al. A System-On-Chip Bus Architecture for Thwarting Integrated Circuit Trojan Horses , 2011, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[6] Ramesh Karri,et al. Attacks and Defenses for JTAG , 2010, IEEE Design & Test of Computers.
[7] Yervant Zorian,et al. Overview of the IEEE P1500 standard , 2003, International Test Conference, 2003. Proceedings. ITC 2003..
[8] Mark Mohammad Tehranipoor,et al. Detecting malicious inclusions in secure hardware: Challenges and solutions , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[9] J. Holleman,et al. A 2.92μW Hardware Random Number Generator , 2006, 2006 Proceedings of the 32nd European Solid-State Circuits Conference.
[10] ChakrabartyKrishnendu. Optimal test access architectures for system-on-a-chip , 2001 .
[11] Krishnendu Chakrabarty,et al. Optimal test access architectures for system-on-a-chip , 2001, TODE.
[12] Rodham E. Tulloss,et al. The Test Access Port and Boundary Scan Architecture , 1990 .