Author:
Pathak Shashank Kumar,Nirmala Devi M.
Publisher
Springer Nature Singapore
Reference30 articles.
1. Kiamilev F, Hoover R (2008) Demonstration of hardware trojans. DEFCON 16
2. DARPA (2007) “TRUST in Integrated Circuits (TIC) - Proposer Information Pamphlet”. http://www.darpa.mil/MTO/solicitations/baa07-24/index.html
3. Australian Government DoD-DSTO (2008) Towards Countering the Rise of the Silicon Trojan. https://apps.dtic.mil/sti/pdfs/ADA496426.pdf
4. Kean T (2002) Cryptographic rights management of FPGA intellectual property cores. In Proceedings of the symposium on field programmable gate arrays (FPGA’02), pp 113–118
5. Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008) Towards trojan-free trusted ICs: problem analysis and detection scheme. Proc Design Autom. Test Eur. (DATE), pp 1362–1365
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献