Author:
Basu Subhashree,Ghoshal Ranjit,Kule Malay
Publisher
Springer Nature Singapore
Reference16 articles.
1. Chakraborty RS, Narasimhan S, Bhunia S (2009) Hardware Trojan: threats and emerging solutions. In: IEEE international high level design validation and test workshop, 2009
2. Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test Comput 27(1)
3. Paris Kitsos, Artemios G. Voyiatzis: Towards a Hardware Trojan Detection Methodology,3rd Mediterranean Conference on Embedded Computing MECO - 2014 (ECyPS’),2014
4. Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In: Proceedings of the IEEE international workshop on hardware-oriented security and trust, (HOST’08), pp 51–57
5. Voyiatzis AG, Stefanidis KG, Kitsos P (2016) Efficient triggering of Trojan hardware logic. In: IEEE 19th international symposium on design and diagnostics of electronic circuits and systems (DDECS)