共 50 条
- [31] The Novel Design Method of Hardware Trojans 2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 173 - 176
- [32] Hard to Detect Combinational Hardware Trojans PROCEEDINGS OF THE 2018 8TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2018), 2018, : 194 - 198
- [33] Stealth Assessment of Hardware Trojans in a Microcontroller 2012 IEEE 30TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2012, : 139 - 142
- [34] Control-Lock: Securing Processor Cores Against Software-Controlled Hardware Trojans GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI, 2019, : 27 - 32
- [35] To Detect, Locate, and Mask Hardware Trojans in Digital Circuits by Reverse Engineering and Functional ECO 2016 21ST ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2016, : 623 - 630
- [36] Thermal Scans for Detecting Hardware Trojans CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2018, 2018, 10815 : 117 - 132
- [37] An Attribute Based Classification of Hardware Trojans 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 351 - 356
- [38] Hardware Trojans: current challenges and approaches IET COMPUTERS AND DIGITAL TECHNIQUES, 2014, 8 (06): : 264 - 273
- [39] Test Generation for Combinational Hardware Trojans PROCEEDINGS OF THE 2016 IEEE ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST 2016), 2016,
- [40] A DIGITAL-TO-DIGITAL INTERFACE FOR A LABORATORY MICROCOMPUTER - HARDWARE AND SOFTWARE CHEMICAL BIOMEDICAL AND ENVIRONMENTAL INSTRUMENTATION, 1983, 12 (04): : 289 - 297