[1] KIAMILEV F,HOOVER R.Demonstration of hardware Trojans[C]//Proceedings of DEFCON'16.Las Vegas,USA:[s.n.],2008:332-346. [2] LIU Jie,ZANG Wei.A new method of realizing RS422 serial communication with FPGA[J].Computer Measurement and Control,2017,25(3):191-194.(in Chinese)刘杰,臧炜.一种新型的FPGA实现RS422串口通信方法[J].计算机测量与控制,2017,25(3):191-194. [3] JIN Y,KUPP N,MAKRIS Y.Experiences in hardware Trojan design and implementation[C]//Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust.Washington D.C.,USA:IEEE Press,2009:50-57. [4] WANG X,NARASIMHANS,KRISHNA A,et al.Sequential hardware Trojan:side-channel aware design and placement[C]//Proceedings of the 29th IEEE International Conference on Computer Design.Washington D.C.,USA:IEEE Press,2011:297-300. [5] SALMANI H,TEHRANIPOOR M,PLUSQUELLIC J.New design strategy for improving hardware Trojan detection and reducing Trojan activation time[C]//Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust.San Francisco,USA:IEEE Computer Society,2009:66-73. [6] NARASIMHAN S,CHAKRABORTY R S,CHAKRABORTY S.Hardware IP protection during evaluation using embedded sequential Trojan[J].IEEE Design and Test of Computers,2012,29(3):70-79. [7] YANG Daming,HUANG Jiaoying,GAO Cheng.Research on detection method of side channel hardware Trojan based on classification learning[J].Electronic Technology and Software Engineering,2018(22):205-209.(in Chinese)杨达明,黄姣英,高成.基于分类学习的侧信道硬件木马检测方法研究[J].电子技术与软件工程,2018(22):205-209. [8] HUANG Zhe.Hardware Trojan circuit design and detection[D].Guangzhou:South China University of Technology,2016.(in Chinese)黄哲.硬件木马电路设计与检测[D].广州:华南理工大学,2016. [9] HUANG Shan.Circuit design and detection of hardware Trojan horse[D].Guangzhou:South China University of Technology,2017.(in Chinese)黄山.硬件木马电路设计与检测[D].广州:华南理工大学,2017. [10] BHUNIA S,HSIAO M S,BANGA M,et al.Hardware Trojan attacks:threat analysis and countermeasures[J].Proceedings of the IEEE,2014,102(8):1229-1247. [11] TEHRANIPOOR M,WANG C.Introduction to hardware security and trust[M].New York,USA:Springer Publishing Company,Inc.,2012. [12] CHAKRABORTY R S,NARASIMHAN S,BHUNIA S.Hardware Trojan:threats and emerging solutions[C]//Proceedings of IEEE International High Level Design Validation and Test Workshop.San Francisco,USA:IEEE Computer Society,2009:166-171. [13] LIU H,LUO H,WANG L.Design of hardware Trojan horse based on counter[C]//Proceedings of IEEE International Conference on Quality,Reliability,Risk,Maintenance,and Safety Engineering.Washington D.C.,USA:IEEE Press,2011:1007-1009. [14] SALMANI H,TEHRANIPOOR M,PLUSQUELLIC J.A novel technique for improving hardware Trojan detection and reducing Trojan activation time[J].IEEE Transactions on Very Large Scale Integration Systems,2012,20(1):112-125. [15] HU Tao,DIAN Songyi,JIANG Ronghua.Hardware Trojan detection based on long short-term memory neural network[J].Computer Engineering,2020,46(7):110-115.(in Chinese)胡涛,佃松宜,蒋荣华.基于长短时记忆神经网络的硬件木马检测[J].计算机工程,2020,46(7):110-115. [16] JIANG Zhenjie,LU Xinquan.Research on the implantation method and defence of Trojan horse[J].Computer Security,2012(6):28-33.(in Chinese)姜振杰,陆新泉.木马的植入方式研究与防范[J].计算机安全,2012(6):28-33. [17] HUANG Jiaoyiing,YANG Daming,WAN Yongkang.Perniciousness analysis of IC hardware Trojan based on characteristic function deployment[C]//Proceedings of International Conference on Mechanical,Electric and Industrial Engineering.Hangzhou,China:[s.n.],2018:12-30. [18] WANG X,SALMANI H,TEHRANIPOOR M,et al.Hardware Trojan detection and isolation using current integration and localized current analysis[C]//Proceedings of the 23rd International Symposium on Defect and Fault-Tolerance in VLSI Systems.Boston,USA:[s.n.],2008:346-358. [19] AGRAWAL D,BAKTIR S,KARAKOYUNLU D,et al.Trojan detection using IC fingerprinting[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2007:215-226. [20] JIN Y,MAKRIS Y.Hardware Trojan detection using path delay fingerprint[C]//Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust.Washington D.C.,USA:IEEE Press,2008:332-346. [21] OLIVER S,KORAK T,MUEHLBERGHUBER M,et al.EM-based detection of hardware Trojans on FPGAs[C]//Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust.Washington D.C.,USA:IEEE Press,2014:158-169. [22] NOEROZ A N,HU K,KOUSHANFAR F,et al.Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps[J].IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,2014,33(12):1792-1805. |