Author:
Bobda Christophe,Mead Joshua,Whitaker Taylor J. L.,Kamhoua Charles,Kwiat Kevin
Publisher
Springer International Publishing
Reference20 articles.
1. IEEE standard for property specification language (PSL). IEEE Std 1850–2010 (Revision of IEEE Std 1850–2005) pp. 1–182, April 2010
2. ARM: Trustzone.
http://www.arm.com/products/processors/technologies/trustzone/
3. Banga, M., Hsiao, M.: A region based approach for the identification of hardware Trojans. In: IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, pp. 40–47, June 2008
4. Bhunia, S., Abramovici, M., Agrawal, D., Bradley, P., Hsiao, M., Plusquellic, J., Tehranipoor, M.: Protection against hardware trojan attacks: towards a comprehensive solution. IEEE Des. Test 30(3), 6–17 (2013)
5. Bhunia, S., Hsiao, M., Banga, M., Narasimhan, S.: Hardware trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Domain Isolation and Access Control in Multi-tenant Cloud FPGAs;Security of FPGA-Accelerated Cloud Computing Environments;2023-09-18
2. Virtualization of Hardware Accelerators in a Network-on-Chip;2023 26th Euromicro Conference on Digital System Design (DSD);2023-09-06
3. FPGA Virtualization in Cloud-Based Infrastructures Over Virtio;2018 IEEE 36th International Conference on Computer Design (ICCD);2018-10
4. FPGAVirt: A Novel Virtualization Framework for FPGAs in the Cloud;2018 IEEE 11th International Conference on Cloud Computing (CLOUD);2018-07