Affiliation:
1. Department of Computer Science and Communications Engineering, Waseda University
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference22 articles.
1. [1] S. Bhunia, M.S. Hsiao, M. Banga, and S. Narasimhan, “Hardware trojan attacks: Threat analysis and countermeasures,” Proc. IEEE, vol.102, no.8, pp.1229-1247, 2014. 10.1109/jproc.2014.2334493
2. [2] J. Francq and F. Frick, “Introduction to hardware trojan detection methods,” Proc. 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp.770-775, 2015. 10.7873/date.2015.1101
3. [3] Y. Jin and Y. Makris, “Hardware Trojan detection using path delay fingerprint,” Proc. 2008 IEEE International Workshop on Hardware Oriented Security and Trust, pp.51-57, 2008. 10.1109/hst.2008.4559049
4. [4] M. Oya, Y. Shi, M. Yanagisawa, and N. Togawa, “A score-based classification method for identifying hardware-Trojans at gate-level netlists,” Proc. 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp.465-470, 2015. 10.7873/date.2015.0352
5. [5] L. Wang, H. Xie, and H. Luo, “Malicious circuitry detection using transient power analysis for ic security,” Proc. 2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE), pp.1164-1167, 2013. 10.1109/qr2mse.2013.6625774