최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기IEEE access : practical research, open solutions, v.7, 2019년, pp.38379 - 38389
Zhang, Tao (University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China) , Wang, Jian (University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China) , Guo, Shize (University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China) , Chen, Zhe (University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China)
As recently studied, field-programmable gate arrays (FPGAs) suffer from growing Hardware Trojan (HT) attacks, and many techniques, e.g., register-transfer level (RTL) code-based analyzing, have been presented to detect HTs on FPGAs. However, for most of the FPGA end users, they can only obtain bitst...
Zhou, Gan, Bo, Rui, Chien, Lungsheng, Zhang, Xu, Yang, Shengchun, Su, Dawei. GPU-Accelerated Algorithm for Online Probabilistic Power Flow. IEEE transactions on power systems : a publication of the Power Engineering Society, vol.33, no.1, 1132-1135.
Quadir, Shahed E., Chen, Junlin, Forte, Domenic, Asadizanjani, Navid, Shahbazmohamadi, Sina, Wang, Lei, Chandy, John, Tehranipoor, Mark. A Survey on Chip to System Reverse Engineering. ACM journal on emerging technologies in computing systems, vol.13, no.1, 1-34.
Courtland, Rachel. 3D X-ray tech for easy reverse engineering of ICs [News]. IEEE spectrum, vol.54, no.5, 11-12.
Torrance, R., James, D.. The State-of-the-Art in IC Reverse Engineering. Lecture notes in computer science, vol.5747, 363-381.
Government Microcircuit Applicat Critical Technol Conf A comprehensive netlist reverse engineering toolset for IC trust meade 2016 281
Subramanyan, Pramod, Tsiskaridze, Nestan, Wenchao Li, Gascon, Adria, Wei Yang Tan, Tiwari, Ashish, Shankar, Natarajan, Seshia, Sanjit A., Malik, Sharad. Reverse Engineering Digital Circuits Using Structural and Functional Analyses. IEEE transactions on emerging topics in computing, vol.2, no.1, 63-80.
Kahn, A. B.. Topological sorting of large networks. Communications of the ACM, vol.5, no.11, 558-562.
Bhunia, Swarup, Hsiao, Michael S., Banga, Mainak, Narasimhan, Seetharam. Hardware Trojan Attacks: Threat Analysis and Countermeasures. Proceedings of the IEEE, vol.102, no.8, 1229-1247.
Proc IEEE Int Test Conf (ITC) Hardware Trojans hidden in RTL don’t cares—Automated insertion and prevention methodologies fern 2015 1
Devadithya, Sandamali, Pedross-Engel, Andreas, Watts, Claire M., Landy, Nathan I., Driscoll, Tom, Reynolds, Matthew S.. GPU-Accelerated Enhanced Resolution 3-D SAR Imaging With Dynamic Metamaterial Antennas. IEEE transactions on microwave theory and techniques, vol.65, no.12, 5096-5103.
Jie Zhang, Feng Yuan, Linxiao Wei, Yannan Liu, Qiang Xu. VeriTrust: Verification for Hardware Trust. IEEE transactions on computer-aided design of integrated circuits and systems : a publication of the IEEE Circuits and Systems Society, vol.34, no.7, 1148-1161.
Chakraborty, R. S., Saha, I., Palchaudhuri, A., Naik, G. K.. Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream. IEEE design & test, vol.30, no.2, 45-54.
Salmani, Hassan. COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist. IEEE transactions on information forensics and security, vol.12, no.2, 338-350.
Xiao, K., Forte, D., Jin, Y., Karri, R., Bhunia, S., Tehranipoor, M.. Hardware Trojans : Lessons Learned after One Decade of Research. ACM transactions on design automation of electronic systems, vol.22, no.1, 1-23.
Ding, Z., Wu, Q., Zhang, Y., Zhu, L.. Deriving an NCD file from an FPGA bitstream: Methodology, architecture and evaluation. Microprocessors and microsystems, vol.37, no.3, 299-312.
Swierczynski, Pawel, Becker, Georg T., Moradi, Amir, Paar, Christof. Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs. IEEE transactions on computers, vol.67, no.3, 348-360.
Project IceStorm wolf 2015
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.