共 50 条
- [41] FPGA Implementation of Traffic Light Controller and its Analysis in the Presence of Hardware Trojan 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 375 - 380
- [42] Trojan-D2: Post-Layout Design and Detection of Stealthy Hardware Trojans - a RISC-V Case Study 2023 28TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC, 2023, : 683 - 689
- [43] Tapeout of a RISC-V Crypto Chip with Hardware Trojans: A Case-Study on Trojan Design and Pre-Silicon Detectability PROCEEDINGS OF THE 18TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2021 (CF 2021), 2021, : 213 - 220
- [44] Strategic hardware trojan testing with hierarchical trojan types 2021, Institute of Electrical and Electronics Engineers Inc.
- [45] Strategic Hardware Trojan Testing with Hierarchical Trojan Types 2021 55TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2021,
- [46] The Design and Implementation of the Trojan Horse Based on Kernel Hacking ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2891 - 2894
- [47] Towards hardware Trojan: Problem analysis and Trojan simulation Int. Conf. Inf. Eng. Comput. Sci. - Proc., ICIECS,
- [48] The design and implementation of the Trojan Horse based on kernel hacking Appl. Mech. Mater., 1660, (2891-2894):
- [50] A method of hardware-trojan detection using design verification techniques Adv. Intell. Sys. Comput., (978-987):