[1] Chakraborty R S, Narasimhan S, Bhunia S, et al. Hardware Trojan: Threats and Emerging Solutions[C]//Proc. of IEEE International High Level Design Validation and Test Workshop. San Francisco, USA: IEEE Press, 2009.
[2] Narasimhan S, Chakraborty R S, Bhunia S. Hardware IP Protection During Evaluation Using Embedded Sequential Trojan[J]. IEEE Design & Test of Computers, 2012, 29(3): 70-79.
[3] 邹 程, 张 鹏, 邓高明, 等. 基于功率旁路泄露的硬件木马设计[J]. 计算机工程, 2011, 37(11): 135-137.
[4] Salmani H, Tehranipoor M, Plusquellic J. A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time[J]. IEEE Transactions on Very Large Scale Integration Systems, 2012, 20(1): 112-125.
[5] Tehranipoor M, Koushanfar F. A Survey of Hardware Trojan Taxonomy and Detection[J]. IEEE Design & Test of Computers, 2010, 27(1): 10-25.
(下转第195页)
(上接第185页)
[6] Agrawal D, Baktir S, Karakoyunlu D. Trojan Detection Using IC Fingerprinting[C]//Proc. of IEEE Symposium on Security and Privacy. Berkeley, USA: IEEE Press, 2007.
[7] Rad R, Plusquellic J, Tehranipoor M. A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental Conditions[J]. IEEE Transactions on Very Large Scale Integration Systems, 2010, 18(12): 1735-1744.
[8] Rad R, Plusquellic J, Tehranipoor M. Sensitivity Analysis to Hardware Trojans Using Power Supply Transient Signals[C]// Proc. of IEEE International Workshop on Hardware-oriented Security and Trust. Los Angeles, USA: IEEE Press, 2008.
[9] Koushanfar F, Mirhoseini A. A Unified Framework for Multi- modal Submodular Integrated Circuits Trojan Detection[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(1): 162-174.
[10] Brier E, Clavier C, Olivier F. Correlation Power Analysis with a Leakage Model[C]//Proc. of CHES’04. Cambridge, USA: Springer, 2004.
编辑 刘 冰 |