共 6 条
- [1] Bhunia S., Hsiao M.S., Banga M., Et al., Hardware Trojan attacks: threatanalysis and countermeasures, Proceedings of the IEEE, 102, 8, pp. 1229-1247, (2014)
- [2] Yang K., Hicks M., Dong Q., Et al., A2: analog malicious hardware, Proc of IEEE Symposium on Security and Privacy(SP), pp. 49-63, (2016)
- [3] Xiao K., Forte D., Jin Y., Et al., Hardware Trojans: lessons learned after one decade of research, ACM Transactions on Design Automation of Electronic Systems, 22, 1, pp. 1-23, (2016)
- [4] Hoque T., Narasimhan S., Wang X., Et al., Golden- free hardware Trojan detection with high sensitivity under process noise, Journal of Electronic Test, 33, 7, pp. 107-124, (2017)
- [5] Balash J., Gierlichs B., Verbauwhede I., Electromagnetic circuit fingerprints for hardware Trojan detection, Proc of IEEE International Symposium on Electromagnetic Compatibility, pp. 246-251, (2015)
- [6] Hardware Trojan benchmarks