[1] 倪林, 李少青, 马瑞聪, 等. 硬件木马检测与防护[J]. 数字通信, 2014, 41(1): 59-63. Ni Lin, Li Shaoqing, Ma Ruicong, et al. Hardware Trojan detection and protection[J]. Digital Communication, 2014, 41(1): 59-63.[2] Agrawal D, Baktir S, Karakoyunlu D, et al. Trojan detection using IC fingerprinting[C]//Proceeding of the 2007 IEEE Symposium Security and Privacy. Oakland, CA, USA: [s. n. ], 2007: 296-310.[3] Ni Lin, Li Shaoqing, Chen Jihua, et al. The influence on sensitivity of hardware Trojans detection by test vector[C]//Proceeding of 2014 Communications Security Conference(CSC2014). Beijing: [s. n. ], 2014: 46-51.[4] Chakraborty R S, Narasimhan S, Bhunia S. Hardware Trojan: threats and emerging solutions[C]//Proceedings of High Level Design Validation and Test Workshop (HLDVT2010), 2010: 166-171.[5] 刘长龙, 赵毅强, 史亚峰, 等. 基于侧信道分析的硬件木马建模与优化[J]. 华中科技大学学报: 自然科学版, 2013, 41(2): 53-67. Liu Changlong, Zhao Yiqiang, Shi Yafeng, et al. Side channel analysis-based modeling and optimizing of hardware Trojan[J]. Journal of Huazhong University of Science and Technology: Natural Science Edition, 2013, 41(2): 53-67.[6] 石磊, 倪林, 李少青, 等. 采样频率对硬件木马检测的影响[C]//第十八届半导体集成电路、硅材料学术会议, 2014: 448-45. Shi Lei, Ni Lin, Li Shaoqing, et al. The influence of sample frequency on the hardware Trojan detection[C]//The 18th National Conference on Semiconductor IC and Silicon Materials, 2014: 448-45. |