[1]
R.S. Chakraborty, S. Narasimhan, S. Bhunia, Hardware Trojan: Threats and emerging solutions, Proc. of IEEE International High Level Design Validation and Test Workshop, pp.166-171, (2009).
DOI: 10.1109/hldvt.2009.5340158
Google Scholar
[2]
H. Salmani, M. Tehranipoor, Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection, IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, Part 1, pp.76-81, (2012).
DOI: 10.1109/tifs.2011.2164908
Google Scholar
[3]
J. Clark, S. Leblanc, S. Knight, Risks associated with USB Hardware Trojan devices used by insiders, Proc. of IEEE International Systems Conference (SysCon), pp.201-208, (2011).
DOI: 10.1109/syscon.2011.5929130
Google Scholar
[4]
T. Kumaki, Y. Mochizuki, and T. Fujino, A Study on Hardware Trojyan embedded Manchurian LSI for Cipher processing, Technical report of IEICE, vol. 111, no. 328, CPSY2011-46, pp.21-26, (2011).
Google Scholar
[5]
Xiaoxiao Wang, H. Salmani, M. Tehranipoor, J. Plusquellic, Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis, Proc. of IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems (DFTVS 08), pp.87-95, (2008).
DOI: 10.1109/dft.2008.61
Google Scholar
[6]
G.T. Becker, A. Lakshminarasimhan, S. Lang Lin, S. Srivathsa, V.B. Suresh, W. Burelson, Implementing hardware Trojans: Experiences from a hardware Trojan challenge, Proc. of IEEE 29th International Conference on Computer Design (ICCD), pp.301-304, (2011).
DOI: 10.1109/iccd.2011.6081414
Google Scholar
[7]
M. Yoshikawa, R. Satoh, T. Kumaki, Hardware Trojan for Security LSI, Proc. of IEEE International Conference on Consumer Electronics, pp.31-32, (2013).
DOI: 10.1109/icce.2013.6486781
Google Scholar
[8]
H. Salmani, M. Tehranipoor, J. Plusquellic, A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 20, no. 1, pp.112-125, (2012).
DOI: 10.1109/tvlsi.2010.2093547
Google Scholar
[9]
S. Narasimhan, Xinmu Wang, Dongdong Du, R.S. Chakraborty, S. Bhunia, TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection, Proc. of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.71-74, (2011).
DOI: 10.1109/hst.2011.5954999
Google Scholar