共 50 条
- [22] A hardware Trojans design using the correlation analysis of electromagnetic emanation Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (10): : 22 - 25
- [23] EM-Based Detection of Hardware Trojans on FPGAs 2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 84 - 87
- [24] Hardware Trojans Embedded in the Dynamic Operation of Analog and Mixed-Signal Circuits PROCEEDINGS OF THE 2015 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2015, : 155 - 158
- [25] Towards Trust Hardware Deployment of Edge Computing: Mitigation of Hardware Trojans Based on Evolvable Hardware APPLIED SCIENCES-BASEL, 2022, 12 (13):
- [26] Design of Hardware Trojans and its Impact on CPS Systems: A Comprehensive Survey 2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
- [27] Red team: Design of intelligent hardware trojans with known defense schemes Proc IEEE Int Conf Comput Des VLSI Comput Process, 2011, (309-312):
- [29] Design for Eliminating Operation Specific Power Signatures from Digital Logic GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI, 2019, : 111 - 116
- [30] Red Team: Design of Intelligent Hardware Trojans with Known Defense Schemes 2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 309 - 312