参考文献
[1]Tehranipoor M,Koushanfar F.A Survey of Hardware Trojan Taxonomy and Detection[J].IEEE Design & Test of Computers,2010,27(1):10-25.
[2]Clark J,Leblanc S,Knight S.Risks Associated with UsbHardware Trojan Devices Used by Insiders[C]//Proceedings of the 5th IEEE International Systems Conference.Montreal,Canada:IEEE Computer Society,2011:201-208.
[3]Narasimhan S,Yueh W,Wang X.Improving IC Security Against Trojan Attacks Through Integration of Security Monitors[J].IEEE Design and Test of Computers,2012,29(5):37-46.
[4]Clark J,Leblanc S,Knight S.Hardware Trojan Horse Device Based on Unintended Usb Channels[C]//Proceedings of the 3rd International Conference on Network and System Security.Seoul,Korea:IEEE Computer Society,2009:1-8.
[5]Agrawal D,Baktir S,karakoyunlu D.Trojan Detection Using IC Fingerprinting[C]//Proceedings of IEEE Symposium on Security and Privacy.San Diego,USA:2007:296-310.
[6]Potkonjak M,Nahapetlan A,Nelson M.Hardware Trojan Horse Detection Using Gate-level Characteriza-tion[C]//Proceedings of Design Automation Conference.Washington D.C.,USA:IEEE Press,2009:688-693.
[7]刘长龙,赵毅强,史亚峰,等.基于相关性分析的硬件木马检测方法[J].计算机工程,2013,39(9):183-185.
[8]邹程,张鹏,邓髙明,等.基于功率旁路泄露的硬件木马设计[J].计算机工程,2011,37(11):135-137.
[9]Badajena J C,Rout C.Incorporating Hidden Markov Model into Anomaly Detection Technique for Network Intrusion Detection[J].International Journal of Computer Applications,2012,53(11):42-47.
[10]Jecheva V.About Some Applications of Hidden Markov Model in Intrusion Detection Systems[J].Matrix,2006,1(1):1-3.
[11]Beal M J,Ghahramani Z,Rasmussen C E.The Infinite Hidden Markov Model[C]//Proceedings of Advances in Neural Information Processing Systems.Cambridge,USA:MIT Press,2002:577-584.
[12]Rabiner L R,Juang B H.An Introduction to Hidden Markov Models[J].IEEE Acoustics,Speech and Signal Processing Magazine,1986,12(3):4-16.
[13]朱明,郭春生.隐马尔可夫模型及其最新应用与发展[J].计算机系统应用,2010,19(7):255-259.
[14]Rabiner L R.A Tutorial on Hidden Markov Model and Selected Application in Speech Recognition[J].Proceedings of the IEEE,1989,77(2):257-285.
[15]向红.基于隐马尔科夫模型的协议异常检测[D].北京:北京交通大学,2007.
[16]苏静,赵毅强,何家骥,等.旁路信号主成分分析的欧式距离硬件木马检测[J].微电子学与计算机,2015(1):1-4.
编辑刘冰 |