共 50 条
- [41] Hardware Trojans in Wireless Cryptographic ICs IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01): : 26 - 35
- [42] Hardware Trojans: Threats, Detection, and Prevention ACM International Conference Proceeding Series, 2023, : 529 - 533
- [43] Can overclocking detect hardware trojans? Proceedings - IEEE International Symposium on Circuits and Systems, 2021, 2021-May
- [44] Implementing Hardware Trojans: Experiences from a Hardware Trojan Challenge 2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 301 - 304
- [45] Covert Communication Channels Based On Hardware Trojans: Open-Source Dataset and AI-Based Detection 2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 101 - 106
- [46] Covert Communication Channels Based On Hardware Trojans: Open-Source Dataset and AI-Based Detection Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, 2024, : 101 - 106
- [47] Identify Hardware Trojans Based on Delay Feature Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2022, 34 (04): : 515 - 521
- [49] Detecting Hardware Trojans: A Tale of Two Techniques PROCEEDINGS OF THE 15TH CONFERENCE ON FORMAL METHODS IN COMPUTER-AIDED DESIGN (FMCAD 2015), 2015, : 6 - 6
- [50] Test Pattern Superposition to Detect Hardware Trojans PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 25 - 30