An efficient methodology for hardware Trojan detection based on canonical correlation analysis
- 1 September 2021
- journal article
- research article
- Published by Elsevier BV in Microelectronics Journal
Abstract
No abstract availableKeywords
Funding Information
- Shandong University
This publication has 25 references indexed in Scilit:
- Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical AnalysisIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2017
- ThermoGaterACM SIGARCH Computer Architecture News, 2017
- ThermoGaterPublished by Association for Computing Machinery (ACM) ,2017
- Reducing Timing Side-Channel Information Leakage Using 3D IntegrationIEEE Transactions on Dependable and Secure Computing, 2017
- Exploiting Voltage Regulators to Enhance Various Power Attack CountermeasuresIEEE Transactions on Emerging Topics in Computing, 2016
- Security implications of simultaneous dynamic and leakage power analysis attacks on nanoscale cryptographic circuitsElectronics Letters, 2016
- On Reverse Engineering-Based Hardware Trojan DetectionIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015
- Side-Channel Attacks from Static Power: When Should We Care?Published by EDAA ,2015
- Countering Power Analysis Attacks UsingReliable and Aggressive DesignsIEEE Transactions on Computers, 2013
- Hardware Trojan Detection by Multiple-Parameter Side-Channel AnalysisIEEE Transactions on Computers, 2012