Author:
Bloom Gedare,Narahari Bhagirath,Simha Rahul,Zambreno Joseph
Subject
Law,General Computer Science
Reference33 articles.
1. The hunt for the kill switch;Adee;IEEE Spectrum,2008
2. Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B. Trojan detection using IC fingerprinting. In: Proceedings of IEEE Symposium on Security and Privacy; May 2007. p. 296–310.
3. Austin T, Larson E, Ernst D. SimpleScalar: an infrastructure for computer system modelling. IEEE Computer Society; February 2001. p. 59–67.
4. Chakraborty RS, Paul S, Bhunia S. On-demand transparency for improving hardware Trojan detectability. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST); June 2008. p. 48–50.
5. Dandalis A, Prasanna V, Rolim J. An adaptive cryptographic engine for IPSEC architectures. In: Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM); 2000. p. 132–44.
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention;Journal of Cryptographic Engineering;2022-07-16
2. A Survey on Recent Detection Methods of the Hardware Trojans;2021 3rd International Conference on Signal Processing and Communication (ICPSC);2021-05-13
3. Brain-Inspired Golden Chip Free Hardware Trojan Detection;IEEE Transactions on Information Forensics and Security;2021
4. Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection;IEEE Transactions on Dependable and Secure Computing;2020-07-01
5. Hardware Trojan Mitigation in Pipelined MPSoCs;ACM Transactions on Design Automation of Electronic Systems;2020-01-29