Author:
Bhardwaj Anshu,Roy Subir Kumar
Reference21 articles.
1. Tehranipoor, M., Koushanfar, F.: A survey of hardware trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)
2. King, S., et al.: Designing and implementing malicious hardware. In: Proceedings of the 1st USENIX Workshop Large-Scale Exploits and Emergent Threats (LEET 2008), pp. 1–8. Usenix Assoc. (2008)
3. Lecture Notes in Computer Science;I Hadžić,1999
4. Lecture Notes in Computer Science;S Skorobogatov,2012
5. Hicks, M., et al.: Overcoming an untrusted computing base: detecting and removing malicious hardware automatically. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 159–172 (2010)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Built-in Software Obfuscation for Protecting Microprocessors against Hardware Trojan Horses;2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT);2023-10-03
2. DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN;Journal of Systems Architecture;2022-08
3. On the optimization of Software Obfuscation against Hardware Trojans in Microprocessors;2022 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS);2022-04-06