[1]TEHRANIPOOR M,KOUSHANFAR F.A survey of hardware Trojan taxonomy and detection[J].IEEE Design and Test of Computers,2010,27(1):10-25.
[2]赵毅强,何家骥,杨松,等.集成电路中硬件木马防御技术研究[J].计算机工程,2016,42(1):128-132.
[3]BHUNIA S,HSIAO M S,BANGA M,et al.Hardware Trojan attacks:threat analysis and countermeasures[J].Journal Impact Factor and Information,2014,102(8):1229-1247.
[4]ZARRINCHIAN G,ZAMANI M S.Latch-based structure:a high resolution and self-reference technique for hardware Trojan detection[J].IEEE Transactions on Computers,2017,66(1):100-113.
[5]RATHMAIR M,SCHUPFER F,KRIEG C.Applied formal methods for hardware Trojan detection[C]//Proceedings of IEEE International Symposium on Circuits and Systems.Washington D.C.,USA:IEEE Press,2014:169-172.
[6]NARASIMHAN S,DU D,CHAKRABORTY R S,et al.Hardware Trojan detection by multiple-parameter side-channel analysis[J].IEEE Transactions on Computers,2013,62(11):2183-2195.
[7]李雄伟,王晓晗,张阳,等.基于多旁路综合分析的硬件木马检测方法[J].计算机仿真,2015,32(3):216-219.
[8]AARESTAD J,ACHARYYA D,RAD R,et al.Detecting Trojans through leakage current analysis using multiple supply pad IDDQS[J].IEEE Transactions on Information Forensicsand Security,2010,5(4):893-904.
[9]WEI S,POTKONJAK M.Scalable hardware Trojan diagnosis[J].IEEE Transactions on Very Large Scale Integration Systems,2012,20(6):1049-1057.
[10]RAI D,LACH J.Performance of delay-based Trojan detection techniques under parameter variations[C]//Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust.Washington D.C.,USA:IEEE Press,2009:58-65.
[11]ISCAS85 test generation benchmark data[EB/OL].[2017-08-15].http://www.cs.ubc.ca/~ajh/courses/cpsc513/assign-cmbcmp-bdd/ISCAS85/.
[12]SAKURAI T,NEWTON A R.Alpha-power law MOSFET model and its applications to CMOS inverter delay and other formulas[J].IEEE Journal of Solid-State Circuits,1990,25(2):584-594.
[13]BUTZEN P F,RIBAS R P.Leakage current in sub-micrometer CMOS gates[EB/OL].[2017-08-15].http://inf.ufrgs.br/logics/docman/book_emicro_butzen.pdf.
[14]Synopsys design compiler[EB/OL].[2017-08-15].http://www.synopsys.com/cn/Tools/Implementation/RTLSynthesis/Pages/default.aspx.
[15]Mentor Graphics v2lvs[EB/OL].[2017-08-15].http://cn.mentor.com/functional-verification.
[16]Synopsys HSPICE[EB/OL].[2017-08-15].http://www.synopsys.com/verification/ams-verification/circuit-simulation/hspice.html.
[17]CHA B,GUPTA S.Efficient Trojan detection via calibration of process variations[C]//Proceedings of the 21st Asian Test Symposium.Washington D.C.,USA:IEEE Press,2012:355-361. |