Author:
Farahmandi Farimah,Rahman M. Sazadur,Rajendran Sree Ranjani,Tehranipoor Mark
Publisher
Springer International Publishing
Reference31 articles.
1. A. Ahmed, F. Farahmandi, Y. Iskander, P. Mishra, Scalable hardware Trojan activation by interleaving concrete simulation and symbolic execution, in 2018 IEEE International Test Conference (ITC) (IEEE, Piscataway, 2018), pp. 1–10
2. R. Baldoni, E. Coppa, D.C. D’elia, C. Demetrescu, I. Finocchi, A survey of symbolic execution techniques. ACM Comput. Surv. 51(3), 1–39 (2018)
3. R.S. Chakraborty, S. Narasimhan, S. Bhunia, Hardware Trojan: threats and emerging solutions, in 2009 IEEE International High Level Design Validation and Test Workshop (2009), pp. 166–171. https://doi.org/10.1109/HLDVT.2009.5340158
4. R.S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, Mero: a statistical approach for hardware Trojan detection. IEEE Trans. CHES 13(10), 1200–1205 (2019)
5. R.S. Chakraborty, S. Pagliarini, J. Mathew, S.R. Rajendran, M.N. Devi, A flexible online checking technique to enhance hardware Trojan horse detectability by reliability analysis. IEEE Trans. Emer. Topics Comput. 5(2), 260–270 (2017). https://doi.org/10.1109/TETC.2017.2654268