Author:
Hamlet Jason R.,Mayo Jackson R.,Kammler Vivian G.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Building and Construction
Reference30 articles.
1. Turing AM (1937) On computable numbers, with an application to the Entscheidungs problem. Proc Lond Math Soc 2.1:230–265
2. Narasimhan, Seetharam, and Swarup Bhunia (2012) Hardware trojan detection. Introduction to hardware security and trust. Springer, New York, pp 339–364
3. Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. Hardware-oriented security and trust, 2008. HOST 2008. IEEE International Workshop on. IEEE
4. Waksman A, Suozzo M, Sethumadhavan S (2013) FANCI: identification of stealthy malicious logic using boolean functional analysis. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM
5. Mitra S, Saxena NR, McCluskey EJ (2000) Common-mode failures in redundant VLSI systems: a survey. IEEE Trans Reliab 49(3):285–295
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Non-Invasive Hardware Trojans Modeling and Insertion: A Formal Verification Approach;Journal of Electronic Testing;2024-02
2. Enhancing Hardware Trojan Security through Reference-Free Clustering using Representatives;2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID);2024-01-06
3. FPGA Hardware Trojan Detection: Golden-Free Machine Learning Approach;NAECON 2023 - IEEE National Aerospace and Electronics Conference;2023-08-28
4. Unsupervised IC Security with Machine Learning for Trojan Detection;2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS);2023-08-06
5. Adversarial Hardware With Functional and Topological Camouflage;IEEE Transactions on Circuits and Systems II: Express Briefs;2021-05