|
[1]M. Tehranipoor and F. Koushanfar, “A survey of hardware Trojan taxonomy and detection,” IEEE Des. Test. Comput., vol. 27, pp. 10–25, 2010. [2]R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, “Trustworthy hardware: Identifying and classifying hardware Trojans,” IEEE Comput., vol. 43, no. 10, pp. 39–46, 2010. [3]J. Rajendran, E. Gavas, J. Jimenez, V. Padman, and R. Karri, “Towards a comprehensive and systematic classification of hardware Trojans,” in Proc. IEEE Int. Symp. Circuits and Syst. (ISCAS), pp. 1871–1874, 2010. [4]R. Rad, J. Plusquellic, and M. Tehranipoor, “Sensitivity analysis to hardware Trojans using power supply transient signals,” in Proc. IEEE Int. Workshop on Hardware-Oriented Security and Trust, 2008, pp. 3–7. [5]Y. Jin, N. Kupp, and Y. Makris, “Experiences in hardware Trojan design and implementation,” in Proc. IEEE Int. Workshop Hardware-Oriented Security and Trust, 2009, pp. 50 –57. [6]G. Bloom, B. Narahari, and R. Simha, “OS support for detecting Trojan circuit attacks,” in Proc. IEEE Int. Workshop Hardware-Oriented Security and Trust. 2009, pp. 100–103. [7]R.S. Chakraborty and S. Bhunia, “Security against hardware Trojan through a novel application of design obfuscation,” in Proc. Int. Conf. Comput.-Aided Des., 2009, pp. 113–116. [8]H. Salmani, M. Tehranipoor, and J. Plusquellic, “A novel technique for improving hardware Trojan detection and reducing Trojan activation time,” IEEE Trans. Very Large Scale Integr. (VLS) Syst., vol. 20, no. 1, pp. 112–125, Jan. 2012. [9]M. Banga and M.S. Hsiao, “A novel sustained vector technique for the detection of hardware Trojans,” in Proc. IEEE Int. Conf. VLSI Des., 2009, pp. 327–332. [10] Y. Jin and Y. Makris, “Hardware Trojan detection using path delay fingerprint,” in Proc. IEEE Int Workshop on Hardware-Oriented Security and Trust, 2008, pp. 51–57. [11] S. Deyati, B. Muldrey, A. Singh, and A. Chatterjee1, “High resolution pulse propagation driven Trojan detection in digital logic: optimization algorithms and infrastructure,” in Proc. IEEE Asian Test Symp., 2014, pp. 200–205. [12] J.-F. Zheng, Static Compaction Algorithm for Clock Delay Faults, Master Dissertations of National Chung Hsing University C.S., July 2015 [13] T.-J. Chiu, A Novel side-channel Attack on Secured Scan Chain, Master Dissertations of National Chung Hsing University C.S., July 2015 [14] J.-Y. Wei, A Study on Hardware Trojans and Detection, Master Dissertations of National Chung Hsing University C.S., July 2015 [15] S.-J. Wang, J.-Y. Wei, S.-H. Huang, and K. S.-M. Li, “Test generation for combinational hardware Trojans,” in Proc. IEEE Asian Hardware-Oriented Security and Trust Symp. (AsianHOST), 2016
|