[1] |
BEHM S,DEETJEN U,KANIYAR S,et al.Digital eco-systems for insurers:opportunities through the Internet of Things[EB/OL].[2020-01-20].https://www.mckinsey.com/industries/financial-services/our-insights/digital-eco systems-for-insurers-opportunities-through-the-internet-of-things.
|
[2] |
HUANG Zhe,YAO Ruohe,LUO Fei.Trigger circuit of hardware trojan based on up/down counter[J].IEICE Transactions on Electronics,2015,98(3):279-282.
|
[3] |
ZHAO Yiqiang,HE Jiaji,YANG Song,et al.Research on defense technology against hardware trojans in integrated circuits[J].Computer Engineering,2016,42(1):128-132,137.(in Chinese)赵毅强,何家骥,杨松,等.集成电路中硬件木马防御技术研究[J].计算机工程,2016,42(1):128-132,137.
|
[4] |
LI Xiongwei,WANG Xiaohan,ZHANG Yang,et al.Survey on the hardware trojan protection[J].Journal of Ordnance Engineering College,2015,27(6):40-50.(in Chinese)李雄伟,王晓晗,张阳,等.硬件木马防护研究综述[J].军械工程学院学报,2015,27(6):40-50.
|
[5] |
KIM L W,VILLASENOR J D.Dynamic function verification for system on chip security against hardware-based attacks[J].IEEE Transactions on Reliability,2015,64(4):1229-1242.
|
[6] |
HUANG Zhe.Design and detection of hardware trojan horse[D].Guangzhou:South China University of Tech-nology,2016.(in Chinese)黄哲.硬件木马电路设计与检测[D].广州:华南理工大学,2016.
|
[7] |
JIN Y,SULLIVAN D.Real-time trust evaluation in integrated circuits[C]//Proceedings of 2014 Design,Automation & Test in Europe Conference & Exhibition.Washington D.C.,USA:IEEE Press,2014:1-6.
|
[8] |
BASAK A,BHUNIA S,RAY S.A flexible architecture for systematic implementation of SoC security policies[C]//Proceedings of IEEE/ACM International Conference on Computer-Aided Design.Washington D.C.,USA:IEEE Press,2015:536-543.
|
[9] |
NATH A P D,RAY S,BASAK A,et al.System-on-chip security architecture and cad framework for hardware patch[C]//Proceedings of the 23rd Asia and South Pacific Design Automation Conference.Washington D.C.,USA:IEEE Press,2018:733-738.
|
[10] |
SHI Shengli,REN Ping'an.Real-time detection method of buffer overflow attacks[J].Computer Engineering,2011,37(10):111-113,116.(in Chinese)史胜利,任平安.一种缓冲区溢出攻击的实时检测方法[J].计算机工程,2011,37(10):111-113,116.
|
[11] |
DUAN Xiaoyi,WANG Sixiang,CUI Qi,et al.A high-order differential power analysis attack scheme with masked AES algorithm[J].Computer Engineering,2017,43(10):120-125.(in Chinese)段晓毅,王思翔,崔琦,等.一种带掩码AES算法的高阶差分功耗分析攻击方案[J].计算机工程,2017,43(10):120-125.
|
[12] |
WANG Sixiang,ZHANG Lei,CUI Qi,et al.Correlation electromagnetic analysis attacks based on signal amplified technology[J].Computer Engineering,2018,44(4):181-186,192.(in Chinese)王思翔,张磊,崔琦,等.基于信号增益放大技术的相关性电磁分析攻击[J].计算机工程,2018,44(4):181-186,192.
|
[13] |
TANG Wenbin,ZHU Yuefei,CHEN Jiayong.Research on attack method of unified extensible firmware interface[J].Computer Engineering,2012,38(13):99-101,111.(in Chinese)唐文彬,祝跃飞,陈嘉勇.统一可扩展固件接口攻击方法研究[J].计算机工程,2012,38(13):99-101,111.
|
[14] |
ZHANG Jinling,LÜ Lei.Hardware trojan detection based on PCA and logistics regression[J].Computer Engineering and Science,2018,40(7):1187-1191.(in Chinese)张金玲,吕蕾.基于主成分分析和对数几率回归的硬件木马检测[J].计算机工程与科学,2018,40(7):1187-1191.
|
[15] |
RAY S,JIN Y.Security policy enforcement in modern SoC designs[C]//Proceedings of 2015 IEEE/ACM International Conference on Computer-Aided Design.Washington D.C.,USA:IEEE Press,2015:345-350.
|
[16] |
TRABER A,ZARUBA F,STUCKI S,et al.PULPino:a small single-core RISC-V SoC[C]//Proceedings of the 3rd RISCV Workshop.Washington D.C.,USA:IEEE Press,2016:15-21.
|
[17] |
SCHIAVONE P D,CONTI F,ROSSI D,et al.Slow and steady wins the race? a comparison of ultra-low-power RISC-V cores for Internet-of-Things applications[C]//Proceedings of the 27th International Symposium on Power and Timing Modeling,Optimization and Simulation.Washington D.C.,USA:IEEE Press,2017:1-8.
|
[18] |
KAN S,DWORAK J.Triggering trojans in SRAM circuits with X-propagation[C]//Proceedings of 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems.Washington D.C.,USA:IEEE Press,2014:1-8.
|
[19] |
VAN DE GOOR A J.Using March tests to test SRAMs[J].IEEE Design & Test of Computers,1993,10(1):8-14.
|
[20] |
DILILLO L,GIRARD P,PRAVOSSOUDOVITCH S,et al.March iC-:an improved version of March C-for ADOFs detection[C]//Proceedings of the 22nd IEEE VLSI Test Symposium.Washington D.C.,USA:IEEE Press,2004:129-134.
|
[21] |
YU Bin.ModelSim electronic system analysis and simulation[M].Beijing:Publishing House of Electronics Industry,2011.(in Chinese)于斌.ModelSim电子系统分析及仿真[M].北京:电子工业出版社,2011.
|