Research on hardware Trojan defense
The definition and features of hardware Trojan were described firstly.After that,recent researches of defense and detection techniques were categorized with complete comparison and analysis.Then,current researches limitations were discussed based on the concepts and the trends perspectives of hardwa...
Saved in:
Main Authors: | Kan WANG, Hao CHEN, Xu-guang GUAN, Yong GU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-09-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00197 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Hardware Trojans detection based on projection pursuit
by: Peng ZHANG, et al.
Published: (2013-04-01) -
Research on electromagnetic radiation based side-channel analysis method for hardware Trojan detection
by: Yongkang TANG, et al.
Published: (2021-04-01) -
Design and detection of hardware Trojan based on satisfiability don't cares
by: Lingjuan WU, et al.
Published: (2021-04-01) -
Hybrid multi‐level hardware Trojan detection platform for gate‐level netlists based on XGBoost
by: Ying Zhang, et al.
Published: (2022-03-01) -
Overview of the detection and prevention study of hardware Trojans
by: Qiang XU, et al.
Published: (2017-04-01)