Author:
Reshma K.,Priyatharishini M.,Nirmala Devi M.
Reference22 articles.
1. Tehranipoor, M., Koushanfar, F.: A survey of hardware trojan taxonomy and detection. In: IEEE Design & Test of Computers, pp. 10–25 (2010)
2. Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards trojan-free trusted ICs: problem analysis and detection scheme. In: Design, Automation and Test in Europe, pp. 1362–1365 (2008)
3. Dubeuf, J., Hely, D., Karri, R.: Run-time detection of hardware trojans: the processor protection unit. In: IEEE European Test Symposium, ETS, pp. 1–6 (2013)
4. Chakraborty, R.S., Pagliarini, S., Mathew, J., Sree Ranjani, R., Nirmala Devi, M.: A flexible online checking technique to enhance hardware trojan horse detectability by reliability analysis. IEEE Trans. Emerg. Topics Comput. (2017)
5. Banga, M., Hsiao, M.: A region based approach for the identification of hardware trojans. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 40–47 (2010)
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献