共 18 条
- [1] Chen S.Y., Vemuri R., Reverse Engineering of Split Manufactured Sequential Circuits Using Satisfiability Checking, Proceedings of the 201836th IEEE International Conference on Computer Design, pp. 530-536, (2019)
- [2] Wang K., Chen H., Guan X., Et al., Research on Hardware Trojan Defense, Chinese Journal of Network and Information Security, 3, 9, pp. 5-16, (2017)
- [3] Qin M., Mu D., Hu W., Et al., Fine-granularity Gate Level Formal Verification Method for Hardware Security, Journal of Xidian University, 45, 5, pp. 143-148, (2018)
- [4] Mao B., Mu D., Hu W., Et al., Quantitative Analysis of Sliding Window Attack for the RSA Timing Channel, Journal of Xidian University, 44, 5, pp. 114-120, (2017)
- [5] He J., Zhao Y., Guo X., Et al., Hardware Trojan Detection through Chip-free Electromagnetic Side-channel Statistical Analysis, IEEE Transactions on Very Large Scale Integration Systems, 25, 10, pp. 2939-2948, (2017)
- [6] Jarvi R.W., McLntyre M.G., Split Manufacturing Method for Advanced Semiconductor Circuits, (2004)
- [7] Jagasivamani M., Gadfort P., Sika M., Et al., Split Fabrication Obfuscation: Metrics and Techniques, Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 7-12, (2014)
- [8] Imeson F., Emtenan A., Garg S., Et al., Securing Computer Hardware Using 3D Integrated Circuit(IC) Technology and Split Manufacturing for Obfuscation, Proceedings of the 2013 USENIX Conference on Security, pp. 495-510, (2013)
- [9] Xu Q., Jiang X., Yao L., Et al., Overview of the Detection and Prevention Study of Hardware Trojans, Chinese Journal of Network and Information Security, 3, 4, pp. 5-17, (2017)
- [10] Vaidyanathan K., Das B.P., Sumbul E., Et al., Building Trusted ICs Using Split Fabrication, Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 1-6, (2014)