Funder
Sichuan Province Science and Technology Support Program
Reference31 articles.
1. Hardware trojan attacks: threat analysis and countermeasures;Bhunia;Proc. IEEE,2014
2. Time-related hardware trojan attacks on processor cores;Kuo,2019
3. Malware detection: program run length against detection rate;Okane;IET Softw.,2014
4. Cpu bugs, cpu backdoors and consequences on security;Duflot;J. Comput. Virol.,2009
5. Hardware-based on-line intrusion detection via system call routine fingerprinting;Zhou,2017