共 50 条
- [41] Detecting hardware Trojan through feature extraction in subspace domain Hu, A. (aqhu@seu.edu.cn), 1600, Southeast University (44):
- [43] Linear Complementary Dual Code Improvement to Strengthen Encoded Circuit Against Hardware Trojan Horses 2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 82 - 87
- [44] Hardware/Software Specialization Through Aspects 2012 INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTER SYSTEMS (SAMOS): ARCHITECTURES, MODELING AND SIMULATION, 2012, : 260 - 267
- [45] Key retrieval from AES architecture through hardware trojan horse Commun. Comput. Info. Sci., (483-494): : 483 - 494
- [46] Compromise through USB-based Hardware Trojan Horse device FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2011, 27 (05): : 555 - 563
- [48] Low Overhead System-Level Obfuscation through Hardware Resource Sharing 2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 141 - 148
- [50] MICROPROCESSORS AND MICROCOMPUTERS - HARDWARE AND SOFTWARE, 2ND EDITION - TOCCI,RJ, LASKOWSKI,LP JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE, 1983, 34 (02): : 158 - 158