Author:
Ghandali Samaneh,Becker Georg T.,Holcomb Daniel,Paar Christof
Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Genetic Algorithm.
http://www.mathworks.com/discovery/genetic-algorithm.html
. Accessed 01 Feb 2016
2. Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: IEEE Symposium on Security and Privacy (SP 2007), pp. 296–310 (2007)
3. Bao, C., Forte, D., Srivastava, A.: On reverse engineering-based hardware Trojan detection. IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst. 35(1), 49–57 (2016)
4. Lecture Notes in Computer Science;GT Becker,2013
5. Lecture Notes in Computer Science;E Biham,2008
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Intellectual Property Design with PUF-based Hardware Security;Engineering, Technology & Applied Science Research;2024-08-02
2. Crosstalk-Based Hardware Trojan In Low Power Designs;2023 20th International SoC Design Conference (ISOCC);2023-10-25
3. Securing AI Hardware: Challenges in Detecting and Mitigating Hardware Trojans in ML Accelerators;2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS);2023-08-06
4. Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations;2023 IEEE Symposium on Security and Privacy (SP);2023-05
5. Trojan-D2;Proceedings of the 28th Asia and South Pacific Design Automation Conference;2023-01-16