Author:
Gören Sezer,Gürsoy Cemil Cem,Yildiz Abdullah
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference22 articles.
1. Alkabani YM, Koushanfar F (2007) Active Hardware metering for intellectual property protection and security. In: Proceedings of USENIX security symposium on USENIX security symposium, Berkeley, pp 20:1-20:16
2. Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan S, Yang K (2012) On the (Im)possibility of obfuscating programs. J ACM 59(2):6:1-6:48
3. Chakraborty RS, Bhunia S (2011) Security against hardware Trojan attacks using key-based design obfuscation. J Electron Test Theory Appl 27(6):767–785
4. Chakraborty RS, Bhunia S (2009) Security against hardware Trojan through a novel application of design obfuscation. In: Proceedings of international conference on computer-aided design, San Jose, pp 113–116
5. Cheng KT, Huang SY, Dai WJ (2006) Fault emulation: a new methodology for fault grading. IEEE Trans Comp-Aided Des Integ Cir Sys 18(10):1487–1495
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献