参考文献 [1]Wang X,Tehranipoor M,Plusquellic J.Detecting Malicious Inclusions in Secure Hardware:Challenges and Solutions[C]//Proceedings of the 1st IEEE International Workshop on Hardware-oriented Security and Trust.Washington D.C.,USA:IEEE Press,2008:15-19. [2]Chakraborty R S,Narasimhan S,Bhunia S.Hardware Trojan:Threats and Emerging Solutions[C]//Pro-ceedings of 2009 IEEE International High Level Design Validation and Test Workshop.San Francisco,USA:IEEE Computer Society,2009:166-171. [3]Rajendran J,Gavas E,Jimenez J,et al.Towards a Comprehensive and Systematic Classification of Hard-ware Trojans[C]//Proceedings of 2010 IEEE International Sympo-sium on Circuits and Systems.Washington D.C.,USA:IEEE Computer Society,2010:1871-1874. [4]Tehranipoor M,Koushanfar F.A Survey of Hardware Trojan Taxonomy and Detection[J].IEEE Design & Test of Computers,2009,27(1):10-25. [5]Wang X,Salmani H,Tehranipoor M,et al.Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis[C]//Proceedings of IEEE International Symposium on Defect & Fault Tolerance of Vlsi Systems.Washington D.C.,USA:IEEE Press,2008:87-95. [6]Rad R M,Wang X,Tehranipoor M,et al.Power Supply Signal Calibration Techniques for Improving Detection Resolution to Hardware Trojans[C]//Proceedings of 2008 International Conference on Computer-aided Design.San Jose,USA:Institute of Electrical and Electronics Engineers,2008:632-639. [7]Jin Y,Makris Y.Hardware Trojan Detection Using Path Delay Fingerprint[C]//Proceedings of 2008 IEEE International Workshop on Hardware-oriented Security and Trust.Washington D.C.,USA:IEEE Press,2008:51-57. [8]刘长龙,赵毅强,史亚峰,等.基于相关性分析的硬件木马检测方法[J].计算机工程,2013,39(9):183-185. [9]李雄伟,王晓晗,张阳,等.基于最大间距准则的硬件木马检测方法研究[J].华中科技大学学报(自然科学版),2016,44(4):23-27. [10]王晓晗,李雄伟,张阳,等.基于核主成分分析的硬件木马检测方法研究[J].计算机测量与控制,2016,24(1):196-198. [11]苏静,赵毅强,何家骥,等.旁路信号主成分分析的欧式距离硬件木马检测[J].微电子学与计算机,2015(1):1-4. [12]王力纬,贾鲲鹏,方文啸,等.基于马氏距离的硬件木马检测方法[J].微电子学,2013,43(6):817-820. [13]赵毅强,刘沈丰,何家骥,等.基于自组织竞争神经网络的硬件木马检测方法[J].华中科技大学学报(自然科学版),2016(2):51-55. [14]薛明富,胡爱群,王箭.基于探索式分区和测试向量生成的硬件木马检测方法[J].电子学报,2016,44(5):1132-1138. [15]Rose G S,McDonald N,Yan L K,et al.A Write-time Based Memristive PUF for Hardware Security Applications[C]//Proceedings of 2013 IEEE/ACM International Conference on Computer-aided Design.Washington D.C.,USA:IEEE Press,2013:830-833. 编辑刘冰 |