共 50 条
- [11] Advancing the State-of-the-Art in Hardware Trojans Design 2017 IEEE 60TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2017, : 823 - 826
- [12] A Red Team Blue Team approach Towards a Secure Processor Design With Hardware Shadow Stack 2017 IEEE 2ND INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2017, : 57 - 62
- [13] Logic and Reduction Operation based Hardware Trojans in Digital Design 2022 19TH INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2022, : 342 - 343
- [14] Logic and Reduction Operation based Hardware Trojans in Digital Design Proceedings - International SoC Design Conference 2022, ISOCC 2022, 2022, : 342 - 343
- [15] Blue team red team approach to hardware trust assessment 2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 285 - 288
- [16] A hardware Trojans design using the correlation analysis of electromagnetic emanation Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (10): : 22 - 25
- [17] Intelligent, Automated Red Team Emulation 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 363 - 373
- [18] Intelligent Hardware Somatosensory Design PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 331 - 334
- [19] Design of Hardware Trojans and its Impact on CPS Systems: A Comprehensive Survey 2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,