Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference42 articles.
1. Jha S, Jha SK (2008) Randomization based probabilistic approach to detect Trojan circuits. In: High Assurance Systems Engineering Symposium, IEEE, pp 117–124
2. Bloom G, Narahari B, Simha R (2009) OS support for detecting Trojan circuit attacks. In: International Workshop on Hardware-Oriented Security and Trust, IEEE, pp 100–103
3. Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229–1247
4. DARPA TRUST Program Information, http://www.acq.osd.mil/dsb/reports/2005-02-HPMS_Report_Final.pdf
5. Lieberman J Whitepaper on National Security Aspects of the Global "Migration of the US Semiconductor Industry", http://lieberman.senate.gov/documents/whitepapers/semiconductor.pdf
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Adversarial ML for DNNs, CapsNets, and SNNs at the Edge;Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing;2023-10-07
2. Hardware Trojans in fdSOI;2023 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED);2023-08-07