A survey of hardware Trojan threat and defense
Top Cited Papers
- 1 September 2016
- journal article
- research article
- Published by Elsevier BV in Integration
- Vol. 55, 426-437
- https://doi.org/10.1016/j.vlsi.2016.01.004
Abstract
No abstract availableKeywords
Funding Information
- National Natural Science Foundation of China (61232016, 61303042, 61402031, 61402162, 61574099, U1405254)
- Ministry of Education of the People's Republic of China
- Southeast University
- Key Laboratory of Computer Network and Information Integration
This publication has 77 references indexed in Scilit:
- Hardware Trojan Attacks: Threat Analysis and CountermeasuresProceedings of the IEEE, 2014
- A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFsJournal of Computer Science and Technology, 2014
- Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based AttacksIEEE Transactions on Reliability, 2014
- Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor NetworksWireless Personal Communications, 2014
- Steganalysis of least significant bit matching using multi-order differencesSecurity and Communication Networks, 2013
- Stealthy Dopant-Level Hardware TrojansLecture Notes in Computer Science, 2013
- On the (im)possibility of obfuscating programsJournal of the ACM, 2012
- Hardware Trojan DetectionPublished by Springer Science and Business Media LLC ,2011
- MERO: A Statistical Approach for Hardware Trojan DetectionLecture Notes in Computer Science, 2009
- Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel EngineeringLecture Notes in Computer Science, 2009