Author:
Amin Hany A.M.,Alkabani Yousra,Selim Gamal M.I.
Reference22 articles.
1. Silencing hardware backdoors;Waksman,2011
2. Tehranipoor M, Koushanfar F. A survey of hardware Trojan taxonomy and detection. In: IEEE des test, vol. 27; 2010. p. 10–25.
3. Beaumont M, Hopkins B, Newby T. Hardware Trojans–prevention, detection, countermeasures. DSTO, defense science and technology organization, PO Box 1500, Edinburgh, South Australia 5111, Australia, 2011.
4. Trustworthy hardware: Trojan detection and design for-trust challenges;Tehranipoor;Computer,2011
5. Wang X, Salmani H, Tehranipoor M, Plusquellic J. Hardware Trojan detection and isolation using current integration and localized current analysis. In: Proceedings of the IEEE international symposium on defect and fault tolerance of VLSI systems; 2008. p. 87–95.
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献