Author:
Suresh Babu N.,Mohankumar N.
Reference12 articles.
1. R.S. Chakraborty, F. Wolff, S. Paul, MERO: a statistical approach for hardware Trojan detection, in Proceedings of Cryptographic Hardware and Embedded Systems Workshop (2009), pp. 396–410
2. A. Thakur, P. Sivaraj, R. Periasamy, N. Mohankumar, Hardware Trojan detection-a survey, in 4th National Conference on Recent Trends in Communication Computation and Signal Processing (2013), pp. 99–102
3. X. Zhang, M. Tehranipoor, Case study: detecting hardware Trojans in third-party digital IP cores, in HOST (2011)
4. D. Karunakaran, N. Mohankumar, Malicious combinational hardware Trojan detection by gate level characterization in 90 nm technology, in Proceeding of International Conference on Computing, Communications and Networking Technology (2014), pp. 1–7.
https://doi.org/10.1109/icccnt.2014.6963036
5. P.K. Maneesh, M. Nirmala Devi, Power based self-referencing scheme for hardware Trojan detection and diagnosis. Indian J. Sci. Technol. 8(24) (2015)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献