共 50 条
- [31] Implementing Hardware Trojans: Experiences from a Hardware Trojan Challenge 2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 301 - 304
- [32] FPGA SoC Architecture and Runtime to Prevent Hardware Trojans from Leaking Secrets 2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 48 - 51
- [33] Exploiting hardware capabilities in interior point methods OPTIMIZATION METHODS & SOFTWARE, 2016, 31 (02): : 435 - 443
- [34] Program Obfuscation with Leaky Hardware ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 722 - +
- [35] Towards Trust Hardware Deployment of Edge Computing: Mitigation of Hardware Trojans Based on Evolvable Hardware APPLIED SCIENCES-BASEL, 2022, 12 (13):
- [36] Hardware Trojans in eNVM Neuromorphic Devices 2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
- [40] Stealth Assessment of Hardware Trojans in a Microcontroller 2012 IEEE 30TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2012, : 139 - 142