参考文献
[1]邢强,骆丽.集成电路设计中IP核的保护措施[J].中国集成电路,2006,15(6):73-75.
[2]Zhang Xuehui,Tehranipoor M.Case Study:Detecting Hardware Trojans in Third-party Digital IP Cores[C]//Proceedings of IEEE International Symposium on Hardware-oriented Security and Trust.Washington D.C.,USA:IEEE Press,2011:67-70.
[3]贺亚娟,倪林,陈吉华,等.基于信号追踪的IP软核硬件木马检测方法[C]//第十九届计算机工程与工艺年会暨第五届微处理器技术论坛论文集.贵阳,中国:[出版者不详],2015:265-270.
[4]Bhasin S,Danger J L,Guilley S,et al.Hardware Trojan Horses in Cryptographic IP Cores[C]//Proceedings of Workshop on Fault Diagnosis and Tolerance in Cryptography.Washington D.C.,USA:IEEE Computer Society,2013:15-29.
[5]倪林,李少青,马瑞聪,等.硬件木马检测与防护[J].数字通信,2014,41(1):59-63.
[6]Agrawal D,Baktir S,Karakoyunlu D,et al.Trojan Detection Using IC Fingerprinting[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,2007:296-310.
[7]Ni Lin,Li Shaoqing,Chen Jihua,et al.The Influence on Sensitivity of Hardware Trojans Detection by Test Vector[EB/OL].(2014-11-21).http://ieeexplore.ieee.org/ielx7/6966888/6919880/06992249.pdf?tp=&arnumber=6992249&isnumber=6919880.
[8]刘长龙,赵毅强,史亚峰,等.基于相关性分析的硬件木马检测方法[J].计算机工程,2013,39(9):183-185.
[9]Li Zhen,Li Lei,Feng Wenfeng,et al.Designing and Implementing Hardware Trojans in ARM9 IP[C]//Proceedings of International Conference on Communications,Circuits and Systems.Washington D.C.,USA:IEEE Press,2013:524-527.
[10]房磊.基于门级网表的硬件木马检测技术研究[D].成都:电子科技大学,2014.
[11]Narasimhan S,Bhunia S,Chakraborty R S.Hardware IP Protection During Evaluation Using Embedded Sequential Trojan[J].Design and Test of Computers,2012,29(3):70-79.
[12]张鹏,邹程,史邓高明,等.基于电磁泄漏相关性分析的硬件木马设计[J].华中科技大学学报(自然科学版),2010,38(10):22-25.
[13]何朝军.数字电路IP软核行为级设计方法研究[D].北京:北京交通大学,2012.
[14]冯艳.基于AES算法的智能卡攻击与防御的研究[D].北京:北京交通大学,2013.
[15]乐大珩.抗功耗攻击的密码芯片电路级防护关键技术研究[D].长沙:国防科学技术大学,2011.
编辑刘冰 |