Author:
Farahmandi Farimah,Rahman M. Sazadur,Rajendran Sree Ranjani,Tehranipoor Mark
Publisher
Springer International Publishing
Reference33 articles.
1. D.M. Anderson, Design for manufacturability: how to Use Concurrent Engineering to Rapidly Develop Low-Cost, High-Quality Products for Lean Production (CRC Press, 2020)
2. A. Basak, S. Bhunia, S. Ray, A flexible architecture for systematic implementation of soc security policies, in 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (2015), pp. 536–543. https://doi.org/10.1109/ICCAD.2015.7372616
3. S. Bhunia, M.S. Hsiao, M. Banga, S. Narasimhan, Hardware trojan attacks: Threat analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014). https://doi.org/10.1109/JPROC.2014.2334493
4. Bloomberg, Planting Tiny Spy Chips in Hardware Can Cost as Little as $200. https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies
5. Cadence, JasperGold Formal Verification. https://www.cadence.com/en_US/home/tools/system-design-and-verification/formal-and-static-verification/jasper-gold-verification-platform/security-path-verification-app.html