Author:
Asăvoae Irina Măriuca,Tofighi Shirazi Ramtine,Riesco Adrián,Yasuyoshi Uemura
Subject
Software,Theoretical Computer Science,Computational Theory and Mathematics,Logic
Reference32 articles.
1. Detecting Hardware Trojans with gate-level information-flow tracking;Hu;IEEE Comput. Soc.,2016
2. Hardware Trojans: lessons learned after one decade of research;Xiao;ACM Trans. Des. Autom. Electron. Syst.,2016
3. Benchmarking of Hardware Trojans and maliciously affected circuits;Shakya;J. Hardware Syst. Secur.,2017
4. The big hack: How China used a tiny chip to infiltrate Amazon and Apple;Robertson,2018