Publisher
Springer Nature Singapore
Reference47 articles.
1. Huang, Z., Wang, Q., Chen, Y., & Jiang, X. (2020). A survey on machine learning against hardware trojan attacks: recent advances and challenges. IEEE Access, 8, 10796–10826.
2. Anderson, M. S., North, C. J. G., & Yiu, K. K. (2008). Towards countering the rise of the silicon trojan.
3. Jin, Y., & Makris, Y. (2008). Hardware trojan detection using path delay fingerprint. In 2008 IEEE International Work Hardware-Oriented Secure Trust HOST (pp. 51–57)
4. Banga, M., & Hsiao, M. S. (2009). A novel sustained vector technique for the detection of hardware Trojans. In Proceedings 22nd International Conference VLSI Design—Held Jointly with 7th International Conference Embedded System (pp. 327–332)
5. Potkonjak, M., Nahapetian, A., Nelson, M., & Massey, T. (2009). Hardware trojan horse detection using gate-level characterization. In Proceedings—Design Automation Conference (pp. 688–693)