메뉴 건너뛰기




Volumn 43, Issue 10, 2010, Pages 39-46

Trustworthy hardware: Identifying and classifying hardware trojans

Author keywords

Design and test; Hardware security and trust; Hardware Trojans; Security and privacy

Indexed keywords


EID: 77958115258     PISSN: 00189162     EISSN: None     Source Type: Trade Journal    
DOI: 10.1109/MC.2010.299     Document Type: Article
Times cited : (439)

References (9)
  • 4
    • 76949093207 scopus 로고    scopus 로고
    • A survey of hardware trojan taxonomy and detection
    • Jan./Feb.
    • M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection," IEEE Design & Test, Jan./Feb., 2010, pp. 10-25.
    • (2010) IEEE Design & Test , pp. 10-25
    • Tehranipoor, M.1    Koushanfar, F.2
  • 6
    • 70350733802 scopus 로고    scopus 로고
    • Hardware Trojan horse detection using gate-level characterization
    • ACM Press
    • M. Potkonjak et al., "Hardware Trojan Horse Detection Using Gate-Level Characterization," Proc. 46th Ann. Design Automation Conf. (DAC 09), ACM Press, 2009, pp. 688-693.
    • (2009) Proc. 46th Ann. Design Automation Conf. (DAC 09) , pp. 688-693
    • Potkonjak, M.1
  • 7
    • 77956000688 scopus 로고    scopus 로고
    • Towards a comprehensive and systematic classification of hardware Trojans
    • IEEE Press
    • J. Rajendran et al., "Towards a Comprehensive and Systematic Classification of Hardware Trojans," Proc. IEEE Int'l Symp. Circuits and Systems (ISCAS10), IEEE Press, 2010, pp. 1871-1874.
    • (2010) Proc. IEEE Int'l Symp. Circuits and Systems (ISCAS10) , pp. 1871-1874
    • Rajendran, J.1
  • 8
    • 44449083733 scopus 로고    scopus 로고
    • The hunt for the kill switch
    • May
    • S. Adee, "The Hunt for the Kill Switch," IEEE Spectrum, May 2008, pp. 34-39.
    • (2008) IEEE Spectrum , pp. 34-39
    • Adee, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.