共 50 条
- [1] The Undetectable and Unprovable Hardware Trojan Horse [J]. 2013 50TH ACM / EDAC / IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2013,
- [2] Code-Controlled Hardware Trojan Horse [J]. INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 171 - 178
- [3] Design of Hardware Trojan Horse Based on Counter [J]. 2011 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2011, : 1007 - 1009
- [7] An Evolutionary Approach to Hardware Encryption and Trojan-Horse Mitigation [J]. PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 1593 - 1598
- [8] Hardware Trojan Horse device based on unintended USB channels [J]. NSS - Netw. Syst. Secur., 1600, (1-8):
- [9] Detection of Hardware Trojan Horse using Unsupervised Learning Approach [J]. 2023 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2023, 2023, : 77 - 82
- [10] Hardware Trojan Horse Device based on Unintended USB Channels [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 1 - 8