Author:
Li He,Liu Qiang,Zhang Jiliang
Funder
National Natural Science Foundation of China
Subject
Electrical and Electronic Engineering,Hardware and Architecture,Software
Reference103 articles.
1. The Trojan-proof chip;Mitra;Spectr. IEEE,2015
2. The Quantum Program of NSA, Available on-line: 〈http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html〉.
3. Hardware Trojan insertion by direct modification of FPGA configuration bitstream;Chakraborty;IEEE Des. Test,2013
4. D.M. Shila, V. Venugopal, Design, implementation and security analysis of hardware Trojan threats in FPGA, In: IEEE International Conference on Communications (ICC), 2014, pp. 719–724.
5. Dynamic function replacement for system-on-chip security in the presence of hardware-based attacks;Kim;IEEE Trans. Reliab.,2014
Cited by
98 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献