Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Building and Construction
Reference34 articles.
1. Imeson F, Emtenan A, Garg S, Tripunitara M (2013) Securing computer hardware using 3d integrated circuit ($$\{IC\}$$) technology and split manufacturing for obfuscation. In Presented as part of the 22nd $$\{USENIX\}$$ Security Symposium ($$\{USENIX\}$$ Security 13), pp 495–510
2. Hasegawa K, Oya M, Yanagisawa M, Togawa N (2016) Hardware trojans classification for gate-level netlists based on machine learning. In On-Line Testing and Robust System Design (IOLTS), 2016 IEEE 22nd International Symposium on, pp 203–206
3. Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE design & test of computers 27(1)
4. Yoshimura M, Bouyashiki T, Hosokawa T (2017) A hardware trojan circuit detection method using activation sequence generations. In Dependable Computing (PRDC), 2017 IEEE 22nd Pacific Rim International Symposium on, pp 221–222
5. Salmani H (2017) Hardware trojan attacks and countermeasures. In Fundamentals of IP and SoC Security. Springer, pp 247–276